Skip to main content

CTM360 Hackerview Integration

T
Written by Tooba Alam
Updated this week

About CTM360 Hackerview

CTM360 Hackerview is an advanced cybersecurity platform designed to safeguard organizations from a wide range of online threats. It offers comprehensive capabilities such as Digital Risk Protection, Attack Surface Monitoring, and Threat Intelligence, enabling businesses to proactively identify, assess, and mitigate vulnerabilities across their external digital footprint.

Through its integration with SIRP’s risk-based Security Orchestration, Automation, and Response (SOAR) platform, CTM360 Hackerview extends its value by enriching collected threat data, enhancing visibility into evolving threat patterns, and automating response actions to contain or neutralize risks efficiently.

This powerful integration empowers Security Operations Center (SOC) teams with Real-time threat detection and visibility, Actionable threat intelligence enriched with contextual data, Faster and automated incident response workflows, Accurate artifact analysis for better threat validation.

Together, CTM360 Hackerview and SIRP create a unified threat management ecosystem that strengthens an organization’s cyber defense posture. SOC teams benefit from streamlined operations, reduced response times, and improved decision-making through contextual insights and automation.

Supported Actions

SIRP’s CTM360 Hackerview integration app allows you to execute the following actions:

S.no

Actions

Description

1

Get Issues

Pulls Issues from CTM360 Hackerview

Enable and Configure the CTM360 Hackerview App

Create CTM360 Hackerview API Credentials

Follow these steps to generate the CTM360 Hackerview API credentials (which will be later used in SIRP to enable the CTM360 Hackerview App:

  1. Log in to your CTM360 Hackerview instance.

  2. Click on the dropdown then select Hackerview next to CTM360 logo.

  3. Select the Integrations option and then click Explore Now.

4. For API KEY click configure in Rest API.

5. Create API key by selecting Name and Member and copy generated API key.

Once the API key is generated.

Configure The SIRP App

  • Next, log in to SIRP, then go to Apps from the left navigation bar

  • Locate the CTM360 Hackerview App.

  • Click on the Toggle button to enable the app.

  • As soon as you enable the App, you will get an option to add the configuration details.

  • Click Save to enable the app.

Create Ingestion Source

In order to start ingesting records from CTM360 Hackerview through API, you need to create a new ingestion source and enable it.

1. Go to Administration section from the left-hand navigation bar

2. Go to Automation > Ingestion Sources

3. Click on Add Source

4 . Fill the fields in the ingestion form as shown in the image above:

  • Status: Enable

  • Ingestion Method: API

  • Format: JSON

  • Name: CTM360 Hackerview (This can be any name to distinguish this ingestion source)

  • Ingestion Type: Incident

  • Applications: CTM360 Hackerview

  • Actions: GET ISSUES

5. Click Save button to create the new ingestion source.

6. The last step after creating an ingestion source is mapping the data fields ingested from CTM360 Hackerview with the fields available in SIRP. After you create the ingestion source, you will get a new configuration icon under the Actions column. Click on the icon to configure the fields.

7. Configure the field mapping as shown in the following screenshot and click Save.

After enabling the ingestion source, SIRP will start to call CTM360 Hackerview’s API every 1 minutes to check for any new records. If SIRP finds any record, it will start ingesting the record within its database.

The results will be visible in the Incident Management module. The Alert tab will list all the ingested records.

Did this answer your question?