Overview
This article shows you how to define the types of attackers Hyver will assess — known as threat sources. These include external attackers (like hackers or third parties) and internal actors (like employees or contractors). Threat sources appear on the Mitigation Graph for each engagement, helping you visualize how attackers might reach your business assets.
How to Define Threat Sources
Open the Threat Sources page
Click the Settings icon in the top-right corner.
Select Threat Sources from the menu.
You’ll see a list of all previously defined threats (this may be empty if you're just getting started).
Add a new threat source
Click Add New Threat in the toolbar:
In the Threat Source Name field:
Choose a name from the dropdown (e.g., "Insider", "External Attacker"), or
Enter a custom name that reflects the attacker’s method or type.
Note: Custom names are added as unique entries but won’t appear in the dropdown for future reuse.
Set threat details
Click Create
Note: You may need to refresh the Mitigation Graph to see the newly added threat icon.
Managing Threats
Use the toolbar to Edit or Delete existing threat sources.
Threat icons are automatically included in every engagement graph once created.
Important notes
Only Administrators can manage threat sources.
Threat sources are global — once created, they appear across all engagements.
Make sure each threat is clearly named and accurately reflects its risk profile.
Wrap-up / Next Steps
Defining your threat sources is a key part of Hyver onboarding. These entries shape how attack paths are modeled and how your organization visualizes cyber risk. Take the time to define threats thoughtfully — this foundation supports everything that comes next.





