Skip to main content

Defining Threat Sources

Set up internal and external attack sources to model threats in Hyver.

Updated over 5 months ago

Overview

This article shows you how to define the types of attackers Hyver will assess — known as threat sources. These include external attackers (like hackers or third parties) and internal actors (like employees or contractors). Threat sources appear on the Mitigation Graph for each engagement, helping you visualize how attackers might reach your business assets. 


How to Define Threat Sources

  1. Open the Threat Sources page

    • Click the Settings icon in the top-right corner.

    • Select Threat Sources from the menu.

    • You’ll see a list of all previously defined threats (this may be empty if you're just getting started).

  2. Add a new threat source

    • Click Add New Threat in the toolbar:

    • In the Threat Source Name field:

      • Choose a name from the dropdown (e.g., "Insider", "External Attacker"), or

      • Enter a custom name that reflects the attacker’s method or type.

    Note: Custom names are added as unique entries but won’t appear in the dropdown for future reuse.

  3. Set threat details

    • Enter a description for the threat source:

    • Assign a likelihood score — how likely is this type of attack to succeed?

  4. Click Create

    • A new row appears in the threat list, including the creation date:

    • The new threat icon is also added to the Mitigation Graph for all engagements.

Note: You may need to refresh the Mitigation Graph to see the newly added threat icon.


Managing Threats

  • Use the toolbar to Edit or Delete existing threat sources.

  • Threat icons are automatically included in every engagement graph once created.


Important notes

  • Only Administrators can manage threat sources.

  • Threat sources are global — once created, they appear across all engagements.

  • Make sure each threat is clearly named and accurately reflects its risk profile.


Wrap-up / Next Steps

Defining your threat sources is a key part of Hyver onboarding. These entries shape how attack paths are modeled and how your organization visualizes cyber risk. Take the time to define threats thoughtfully — this foundation supports everything that comes next.

Did this answer your question?