<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Devanand Premkumar</title>
    <description>The latest articles on Forem by Devanand Premkumar (@devaonbreaches).</description>
    <link>https://forem.com/devaonbreaches</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1261951%2Fb70efd29-83bc-4fc0-a72d-86184021f107.jpg</url>
      <title>Forem: Devanand Premkumar</title>
      <link>https://forem.com/devaonbreaches</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/devaonbreaches"/>
    <language>en</language>
    <item>
      <title>Free Breach Alerts in Microsoft Sentinel: One-Click Setup with XposedOrNot</title>
      <dc:creator>Devanand Premkumar</dc:creator>
      <pubDate>Thu, 12 Feb 2026 13:50:23 +0000</pubDate>
      <link>https://forem.com/devaonbreaches/free-breach-alerts-in-microsoft-sentinel-one-click-setup-with-xposedornot-4gb0</link>
      <guid>https://forem.com/devaonbreaches/free-breach-alerts-in-microsoft-sentinel-one-click-setup-with-xposedornot-4gb0</guid>
      <description>&lt;p&gt;Data breaches don't announce themselves. Your organization's credentials could be sitting in dark web marketplaces right now, and most security teams won't find out until someone uses them.&lt;/p&gt;

&lt;p&gt;We built a Microsoft Sentinel connector that pulls breach exposure data into your SIEM automatically. Free tier included. One-click deploy. No agents to install.&lt;/p&gt;

&lt;h2&gt;
  
  
  What XposedOrNot Is (Quick Context)
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://xposedornot.com" rel="noopener noreferrer"&gt;XposedOrNot&lt;/a&gt; is a free, open-source breach monitoring platform. We track &lt;strong&gt;10.5 billion+ exposed records&lt;/strong&gt; across &lt;strong&gt;661 verified breaches&lt;/strong&gt;, with &lt;strong&gt;835 million+ compromised passwords&lt;/strong&gt; checked against our database.&lt;/p&gt;

&lt;p&gt;You can explore the full list of tracked breaches at &lt;a href="https://xposedornot.com/our-repository" rel="noopener noreferrer"&gt;our data repository&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The platform offers email breach checks, password exposure lookups (using k-anonymity so your password never leaves your device), risk scoring, and domain monitoring. Everything is API-first, and the core service is free.&lt;/p&gt;

&lt;p&gt;The Sentinel connector brings all of this into your existing security workflow.&lt;/p&gt;

&lt;h2&gt;
  
  
  What the Connector Does
&lt;/h2&gt;

&lt;p&gt;The connector syncs breach exposure data into your Sentinel workspace on a schedule you choose (every 1, 6, 12, or 24 hours).&lt;/p&gt;

&lt;p&gt;Once connected, you get:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Breach exposure per domain&lt;/strong&gt; you monitor&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk-scored credentials&lt;/strong&gt; (plaintext vs. hashed vs. unknown)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Pre-built workbook&lt;/strong&gt; for executive reporting&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Analytics rules&lt;/strong&gt; that fire when new exposures show up&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You keep doing your normal Sentinel work, and breach intel shows up alongside your other security data. Passive early warning.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;XposedOrNot API --&amp;gt; Logic App --&amp;gt; Data Collection Endpoint/Rule
                       |                      |
                       v                      v
                  Key Vault            Log Analytics Workspace
                 (API Key)                    |
                                              v
                                      Microsoft Sentinel
                                     (Workbook + Analytics)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Data flow:&lt;/strong&gt; Logic App runs on schedule (default: every 12h), grabs the API key from Key Vault, calls XposedOrNot, and pushes results into Log Analytics via the Data Collection Rule. Sentinel picks it up for the workbook and analytics rules.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Gets Deployed
&lt;/h2&gt;

&lt;p&gt;Nine Azure resources, all managed via a single ARM template:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Resource&lt;/th&gt;
&lt;th&gt;What It Does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Key Vault&lt;/td&gt;
&lt;td&gt;Stores your API key (RBAC, no access policies)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Data Collection Endpoint&lt;/td&gt;
&lt;td&gt;Ingestion pipeline&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Data Collection Rule&lt;/td&gt;
&lt;td&gt;Defines the schema and routing&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Logic App&lt;/td&gt;
&lt;td&gt;Pulls data on schedule (Managed Identity, no manual auth)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Workbook&lt;/td&gt;
&lt;td&gt;Breach intelligence dashboard&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Analytics Rule&lt;/td&gt;
&lt;td&gt;Detects new exposures (disabled by default, enable after 24h)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The Logic App runs under a Managed Identity. Zero passwords, zero service principals to rotate. It talks to Key Vault, grabs your API key, hits the XposedOrNot API, and pushes results into your custom log table.&lt;/p&gt;

&lt;h2&gt;
  
  
  Prerequisites
&lt;/h2&gt;

&lt;p&gt;You need two things:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. A Sentinel-enabled Log Analytics workspace&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Already have one? Skip ahead. If not:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Create workspace&lt;/span&gt;
az monitor log-analytics workspace create &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--resource-group&lt;/span&gt; your-rg &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--workspace-name&lt;/span&gt; your-workspace &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--location&lt;/span&gt; eastus

&lt;span class="c"&gt;# Enable Sentinel&lt;/span&gt;
az sentinel onboarding-state create &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--resource-group&lt;/span&gt; your-rg &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--workspace-name&lt;/span&gt; your-workspace &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;--name&lt;/span&gt; default
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;2. An XposedOrNot API key&lt;/strong&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Edition&lt;/th&gt;
&lt;th&gt;Best For&lt;/th&gt;
&lt;th&gt;Features&lt;/th&gt;
&lt;th&gt;Where to Get It&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Community (free)&lt;/td&gt;
&lt;td&gt;Individual or small team monitoring&lt;/td&gt;
&lt;td&gt;Basic breach checks, standard polling&lt;/td&gt;
&lt;td&gt;&lt;a href="https://xposedornot.com" rel="noopener noreferrer"&gt;xposedornot.com&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;xonEnterprise+&lt;/td&gt;
&lt;td&gt;Organization-wide workforce protection&lt;/td&gt;
&lt;td&gt;Multi-domain monitoring, sub-minute alerting, executive dashboards&lt;/td&gt;
&lt;td&gt;&lt;a href="https://plus.xposedornot.com" rel="noopener noreferrer"&gt;plus.xposedornot.com&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;xonThreatIntel+&lt;/td&gt;
&lt;td&gt;Vendor/supply chain monitoring&lt;/td&gt;
&lt;td&gt;Real-time intelligence feeds, deep web monitoring, partner domain tracking&lt;/td&gt;
&lt;td&gt;&lt;a href="https://plus.xposedornot.com" rel="noopener noreferrer"&gt;plus.xposedornot.com&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The free Community key gets you started. When you need to monitor your entire organization's domains, track vendor exposure, or get sub-minute alerting, the Plus tiers unlock everything. The connector works with all editions without any changes on the Sentinel side.&lt;/p&gt;

&lt;h2&gt;
  
  
  Deploy in 60 Seconds
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Option 1: Click the Button
&lt;/h3&gt;

&lt;p&gt;Head to the &lt;a href="https://github.com/XposedOrNot/XposedOrNot-Sentinel" rel="noopener noreferrer"&gt;GitHub repo&lt;/a&gt; and hit &lt;strong&gt;Deploy to Azure&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4ubmeg9p3qpq17opv1hz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4ubmeg9p3qpq17opv1hz.png" alt=" " width="800" height="616"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The portal wizard asks for three things:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Workspace name&lt;/li&gt;
&lt;li&gt;Workspace resource group&lt;/li&gt;
&lt;li&gt;Your XposedOrNot API key&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Click Create. Done.&lt;/p&gt;

&lt;h3&gt;
  
  
  Option 2: CLI
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;az deployment group create &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;-g&lt;/span&gt; your-resource-group &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;-f&lt;/span&gt; mainTemplate.json &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;-p&lt;/span&gt; &lt;span class="nv"&gt;workspaceName&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;your-workspace &lt;span class="se"&gt;\&lt;/span&gt;
     &lt;span class="nv"&gt;workspaceResourceGroup&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;your-workspace-rg &lt;span class="se"&gt;\&lt;/span&gt;
     &lt;span class="nv"&gt;xonApiKey&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;your-api-key
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Either way, here's what happens after deploy:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;
&lt;th&gt;What Happens&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;0 min&lt;/td&gt;
&lt;td&gt;Deployment completes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;~2 min&lt;/td&gt;
&lt;td&gt;First sync kicks off (Azure permissions need to propagate)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;~5 min&lt;/td&gt;
&lt;td&gt;Data shows up in your workspace&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  Verify It's Working
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Heads up:&lt;/strong&gt; After deployment, the Logic App needs a few minutes to pull and process the initial data from XposedOrNot. Give it about 5 minutes before running your first query. If you get zero results immediately after deploy, that's normal. Grab a coffee, come back, and try again.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Run this in Log Analytics:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;XonBreachDetails_CL
| take 10
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You should see records with fields like &lt;code&gt;Email&lt;/code&gt;, &lt;code&gt;BreachName&lt;/code&gt;, &lt;code&gt;PasswordRisk&lt;/code&gt;, and &lt;code&gt;ExposedDataTypes&lt;/code&gt;. If rows come back, you're live.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Data You Get
&lt;/h2&gt;

&lt;p&gt;Every record in &lt;code&gt;XonBreachDetails_CL&lt;/code&gt; includes:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;th&gt;What It Tells You&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;Email&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;string&lt;/td&gt;
&lt;td&gt;The exposed email address&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;EmailDomain&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;string&lt;/td&gt;
&lt;td&gt;Domain part of the email&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;BreachName&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;string&lt;/td&gt;
&lt;td&gt;Which breach it came from&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;BreachedDate&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;datetime&lt;/td&gt;
&lt;td&gt;When the breach happened&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;PasswordRisk&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;string&lt;/td&gt;
&lt;td&gt;
&lt;code&gt;plaintext&lt;/code&gt;, &lt;code&gt;easytocrack&lt;/code&gt;, &lt;code&gt;unknown&lt;/code&gt;, or &lt;code&gt;stronghash&lt;/code&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;ExposedDataTypes&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;string&lt;/td&gt;
&lt;td&gt;What categories of data leaked&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;ExposedRecords&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;number&lt;/td&gt;
&lt;td&gt;How big the breach was&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;code&gt;PasswordRisk&lt;/code&gt; is the field that should worry you the most. &lt;code&gt;plaintext&lt;/code&gt; means the password was stored in clear text by the breached service. If your employee reused that password on your systems, you have an active problem.&lt;/p&gt;

&lt;h2&gt;
  
  
  Queries Worth Running
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Find your highest-risk exposures:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;XonBreachDetails_CL
| where PasswordRisk in ('plaintext', 'easytocrack')
| summarize Count=count() by Email, PasswordRisk
| order by Count desc
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;These are the accounts that need password resets yesterday.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Breach exposure by domain:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;XonBreachDetails_CL
| summarize 
    Exposures = count(),
    Breaches = dcount(BreachName)
  by Domain
| order by Exposures desc
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Useful when you monitor multiple domains. Shows which parts of your organization are most exposed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Track new exposures over time:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;XonBreachDetails_CL
| where TimeGenerated &amp;gt; ago(7d)
| summarize Count=count() by bin(TimeGenerated, 1h)
| render timechart
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Plug this into a dashboard, and you'll see breach data flowing in on each sync cycle.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Workbook
&lt;/h2&gt;

&lt;p&gt;Once data starts flowing, head to &lt;strong&gt;Microsoft Sentinel &amp;gt; Workbooks &amp;gt; My workbooks &amp;gt; XposedOrNot Breach Intelligence&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F43u6i8x747zkvhtr05dd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F43u6i8x747zkvhtr05dd.png" alt=" " width="800" height="400"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2a9lcle5pjpq6itojzy3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2a9lcle5pjpq6itojzy3.png" alt=" " width="800" height="243"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The workbook gives you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Exposure analytics across all monitored domains&lt;/li&gt;
&lt;li&gt;Risk breakdown by password type&lt;/li&gt;
&lt;li&gt;Breach timeline showing when exposures were detected&lt;/li&gt;
&lt;li&gt;Drill down into individual breaches and affected accounts&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;No KQL required. Your CISO can open this and understand the exposure posture in minutes.&lt;/p&gt;

&lt;h2&gt;
  
  
  Enable the Analytics Rule
&lt;/h2&gt;

&lt;p&gt;After 24 hours of data collection (so you have a baseline), go to:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Microsoft Sentinel &amp;gt; Analytics &amp;gt; find "XposedOrNot - New Breach Exposure Detected" &amp;gt; Enable&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This creates incidents when new breach exposures are detected in your monitored domains. From there, you can build playbooks: automatically trigger password resets, notify affected users, or route to your existing incident response workflow.&lt;/p&gt;

&lt;h2&gt;
  
  
  What This Costs
&lt;/h2&gt;

&lt;p&gt;The XposedOrNot Community API is free. The Azure costs are minimal:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Logic App&lt;/strong&gt;: Runs once every 12 hours by default. A few cents per month.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Log Analytics ingestion&lt;/strong&gt;: Depends on data volume. For most organizations, monitoring a handful of domains costs single-digit dollars per month.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Key Vault&lt;/strong&gt;: Negligible. One secret, occasional reads.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you're already running Sentinel, this barely moves the needle on your Azure bill.&lt;/p&gt;

&lt;h2&gt;
  
  
  Security Notes
&lt;/h2&gt;

&lt;p&gt;A few things we built intentionally:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Key Vault uses RBAC&lt;/strong&gt;, not access policies. The Logic App's Managed Identity gets a scoped role. No one else has access by default.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No secrets in the ARM template.&lt;/strong&gt; The API key goes straight into Key Vault during deployment.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Logic App doesn't store data.&lt;/strong&gt; It reads from the API, transforms, and pushes to Log Analytics. Nothing persists in the Logic App itself.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;All communication over HTTPS.&lt;/strong&gt; API calls to XposedOrNot, Key Vault reads, Log Analytics writes: all TLS.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Going Further
&lt;/h2&gt;

&lt;p&gt;Some things worth exploring once you're up and running:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Build a playbook&lt;/strong&gt; that auto-resets passwords when &lt;code&gt;PasswordRisk = 'plaintext'&lt;/code&gt; exposures show up&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Correlate with sign-in logs&lt;/strong&gt; to check if exposed credentials were actually used to authenticate&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Monitor vendor domains&lt;/strong&gt; with xonThreatIntel+ to catch supply chain breaches before they reach your perimeter&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Track executive exposure&lt;/strong&gt; with xonEnterprise+ for C-suite credential monitoring&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Set up weekly reports&lt;/strong&gt; to your CISO with exposure trends&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Connect to Teams/Slack&lt;/strong&gt; via Sentinel playbooks for real-time notifications&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Get Started
&lt;/h2&gt;

&lt;p&gt;The repo, API, and community tier are all free and open source.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;GitHub repo:&lt;/strong&gt; &lt;a href="https://github.com/XposedOrNot/XposedOrNot-Sentinel" rel="noopener noreferrer"&gt;XposedOrNot/XposedOrNot-Sentinel&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Free API key:&lt;/strong&gt; &lt;a href="https://xposedornot.com" rel="noopener noreferrer"&gt;xposedornot.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Browse tracked breaches:&lt;/strong&gt; &lt;a href="https://xposedornot.com/our-repository" rel="noopener noreferrer"&gt;xposedornot.com/our-repository&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Enterprise plans:&lt;/strong&gt; &lt;a href="https://plus.xposedornot.com" rel="noopener noreferrer"&gt;plus.xposedornot.com&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you spot something we should improve, &lt;a href="https://github.com/XposedOrNot/XposedOrNot-Sentinel/issues" rel="noopener noreferrer"&gt;open an issue&lt;/a&gt;. PRs welcome.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Have you set up breach monitoring in your SIEM before? Curious what other integrations you'd want to see.&lt;/strong&gt; Drop a comment, I read all of them.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Written by &lt;a href="https://twitter.com/DevaOnBreaches" rel="noopener noreferrer"&gt;Devanand Premkumar&lt;/a&gt;, founder of XposedOrNot. Tracking breaches since 2017.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>security</category>
      <category>azure</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Just Launched: xonPlus – Real-Time Breach Alerts for Devs and Security Teams</title>
      <dc:creator>Devanand Premkumar</dc:creator>
      <pubDate>Wed, 16 Jul 2025 07:02:44 +0000</pubDate>
      <link>https://forem.com/devaonbreaches/just-launched-xonplus-real-time-breach-alerts-for-devs-and-security-teams-4ccp</link>
      <guid>https://forem.com/devaonbreaches/just-launched-xonplus-real-time-breach-alerts-for-devs-and-security-teams-4ccp</guid>
      <description>&lt;p&gt;Hey devs 👋&lt;/p&gt;

&lt;p&gt;I love building tools that solve real, annoying problems, and &lt;a href="https://plus.xposedornot.com/" rel="noopener noreferrer"&gt;xonPlus&lt;/a&gt; was born out of one of the most frustrating: not knowing when your organization’s data gets breached.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🔍 How It Started&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A while back, I built &lt;strong&gt;&lt;a href="https://xposedornot.com/" rel="noopener noreferrer"&gt;XposedOrNot&lt;/a&gt;&lt;/strong&gt;, a free tool that allows anyone to check if their email address was exposed in a breach. It started as a small side project, just something to learn from.&lt;/p&gt;

&lt;p&gt;Then, security teams began to arrive. They weren’t looking to check one email; they wanted to monitor entire domains, get real-time alerts, and pipe breach data into their systems.&lt;/p&gt;

&lt;p&gt;At first, I wrote scripts. Then a few quick dashboards. But it was clear what they needed wasn’t another bloated, costly tool or a noisy feed. They needed something fast, focused, and dev-friendly.&lt;/p&gt;

&lt;p&gt;So I built &lt;a href="https://plus.xposedornot.com/" rel="noopener noreferrer"&gt;xonPlus&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🚀 What It Does&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;xonPlus&lt;/strong&gt; is a real-time breach alerting system.&lt;/p&gt;

&lt;p&gt;It monitors your organization’s emails and domains across billions of breach records and lets you know the moment something shows up.&lt;/p&gt;

&lt;p&gt;When your data is exposed, whether in a public breach, paste site, or dark web dump, you get an alert with full context: breach source, affected accounts, and what actions to take.&lt;/p&gt;

&lt;p&gt;You can plug alerts into:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Slack&lt;/li&gt;
&lt;li&gt;Microsoft Teams&lt;/li&gt;
&lt;li&gt;Email&lt;/li&gt;
&lt;li&gt;Splunk&lt;/li&gt;
&lt;li&gt;Or just call the API and wire it into your stack&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;🧰 How It’s Built&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Under the hood:&lt;br&gt;
&lt;strong&gt;FastAPI&lt;/strong&gt; for async performance (originally started in Flask)&lt;br&gt;
&lt;strong&gt;Google Cloud Run&lt;/strong&gt; + &lt;strong&gt;Google Datastore&lt;/strong&gt; for scale&lt;br&gt;
&lt;strong&gt;Redis&lt;/strong&gt; for caching and rate limiting&lt;br&gt;
&lt;strong&gt;Cloudflare&lt;/strong&gt; for hosting&lt;br&gt;
Support for bulk email checks, multi-domain monitoring, and custom alerting&lt;/p&gt;

&lt;p&gt;There’s also a simple frontend if your team wants to view breach timelines and trends visually.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧠 Who It’s For&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;xonPlus currently supports three main modules:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;a href="https://plus.xposedornot.com/products/enterprise" rel="noopener noreferrer"&gt;xonEnterprise+&lt;/a&gt; → for domain-wide monitoring&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://plus.xposedornot.com/products/consumer" rel="noopener noreferrer"&gt;xonConsumer+&lt;/a&gt; → to alert your users if they’re exposed&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://plus.xposedornot.com/products/api" rel="noopener noreferrer"&gt;xonAPI+&lt;/a&gt; → If you want to build breach visibility into your product&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;It’s useful whether you’re a &lt;strong&gt;solo engineer&lt;/strong&gt;, a &lt;strong&gt;security lead&lt;/strong&gt;, or a &lt;strong&gt;developer working on auth&lt;/strong&gt;, &lt;strong&gt;fraud prevention&lt;/strong&gt;, or &lt;strong&gt;compliance workflows&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;💡 Why It Matters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Breaches are happening constantly. Credentials are getting leaked, reused, and exploited.&lt;/p&gt;

&lt;p&gt;But most orgs don’t find out until attackers are already inside.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://plus.xposedornot.com/" rel="noopener noreferrer"&gt;xonPlus&lt;/a&gt; gives you a clear signal when something’s wrong and a chance to act before it becomes a full-blown incident.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;📣 What’s Next&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I’m adding more features based on early feedback, especially around automation, exports, and deeper integrations.&lt;/p&gt;

&lt;p&gt;If this sounds useful or you’re curious about how it works, here’s the full backstory:&lt;br&gt;
 👉&lt;a href="https://blog.xposedornot.com/xonplus-launch/" rel="noopener noreferrer"&gt;https://blog.xposedornot.com/xonplus-launch/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I’d love to hear your thoughts, suggestions, or critiques. &lt;/p&gt;

&lt;p&gt;Always open to ideas that make the product better.&lt;/p&gt;

&lt;p&gt;Thanks for reading 🙌&lt;/p&gt;

</description>
      <category>darkwebmonitoring</category>
      <category>ato</category>
      <category>api</category>
    </item>
    <item>
      <title>🚀 Join the XON Hackathon 2024 - 10 Days Left to Win Prizes! 🏆</title>
      <dc:creator>Devanand Premkumar</dc:creator>
      <pubDate>Sat, 03 Feb 2024 08:04:52 +0000</pubDate>
      <link>https://forem.com/devaonbreaches/join-the-xon-hackathon-2024-10-days-left-to-win-prizes-4ghd</link>
      <guid>https://forem.com/devaonbreaches/join-the-xon-hackathon-2024-10-days-left-to-win-prizes-4ghd</guid>
      <description>&lt;p&gt;Hey dev.to Community,&lt;/p&gt;

&lt;p&gt;We're excited to invite you to the &lt;strong&gt;XON Hackathon 2024&lt;/strong&gt;! There are just 10 days left, and we don't want you to miss your chance to grab some fantastic prizes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What's XON Hackathon 2024 all about?&lt;/strong&gt;&lt;br&gt;
It's your opportunity to showcase your coding skills and maybe even learn something new. Whether you're a beginner or a coding pro, we've got something for everyone.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Participate?&lt;/strong&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;💡 Solve exciting challenges
🏆 Win awesome prizes
🤝 Connect with a friendly coding community
🌟 Boost your coding skills
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;How to Get Involved?&lt;/strong&gt;&lt;br&gt;
Simply visit to &lt;a href="https://docs.google.com/forms/d/1dzDmXn9Htfr_wgjJyPPY4OZm_9YhXYIsrsrpxjxgH-I/edit"&gt;register for the hackathon&lt;/a&gt; and join the fun!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Need Guidance?&lt;/strong&gt;&lt;br&gt;
Check out our blog post for &lt;a href="https://blog.xposedornot.com/xposedornot-hackathon-2024/"&gt;rules and guidance&lt;/a&gt; on the hackathon.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Questions or Need Assistance?&lt;/strong&gt;&lt;br&gt;
We're here to help. Feel free to reach out anytime.&lt;/p&gt;

&lt;p&gt;Don't miss out on the action. Join the XON Hackathon 2024 today and show the world your coding magic! 🔮&lt;/p&gt;

&lt;p&gt;Let's code together and make these last 10 days count! 🚀&lt;/p&gt;

&lt;p&gt;P.S.: Please show your support and appreciation for &lt;a href="https://github.com/XposedOrNot/XposedOrNot-API"&gt;XposedOrNot - open-source data breach monitoring&lt;/a&gt; solution on GitHub.&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>programming</category>
      <category>opensource</category>
      <category>learning</category>
    </item>
    <item>
      <title>Join the XposedOrNot Hackathon 2024: Innovate for Internet Safety!</title>
      <dc:creator>Devanand Premkumar</dc:creator>
      <pubDate>Sun, 21 Jan 2024 06:11:32 +0000</pubDate>
      <link>https://forem.com/devaonbreaches/join-the-xposedornot-hackathon-2024-innovate-for-internet-safety-1fap</link>
      <guid>https://forem.com/devaonbreaches/join-the-xposedornot-hackathon-2024-innovate-for-internet-safety-1fap</guid>
      <description>&lt;h2&gt;
  
  
  🚀 XposedOrNot Hackathon 2024: A Call to All Devs!
&lt;/h2&gt;

&lt;p&gt;Hello, Dev.to Community!&lt;/p&gt;

&lt;p&gt;I am super excited to announce the &lt;strong&gt;XposedOrNot Hackathon 2024&lt;/strong&gt;! It's a unique opportunity for developers like you to contribute to an important cause – improving internet safety and data security. Here's everything you need to know:&lt;/p&gt;

&lt;h3&gt;
  
  
  About XposedOrNot
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://github.com/XposedOrNot/XposedOrNot-API"&gt;XposedOrNot&lt;/a&gt; is an open-source project dedicated to helping users discover if their personal information has been compromised in data breaches. In today's digital age, our project is more relevant than ever, and we need your innovative minds to enhance its capabilities.&lt;/p&gt;

&lt;h3&gt;
  
  
  🎯 Hackathon Goals
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Engage with a vibrant developer community.&lt;/li&gt;
&lt;li&gt;Accelerate development and innovation in the XposedOrNot project.&lt;/li&gt;
&lt;li&gt;Create new features and improvements, enhancing user experience and security.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  👩‍💻 Who Should Participate?
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Whether you're a seasoned developer or just starting out, your ideas and skills are invaluable.&lt;/li&gt;
&lt;li&gt;Individuals and teams are both welcome.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🏆 Prizes
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Over $3,000 in prizes, with a top prize of $750!&lt;/li&gt;
&lt;li&gt;Community choice awards, early bird prizes, and random draws.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🗓️ Key Dates
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Start Date&lt;/strong&gt;: January 22, 2024&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;End Date&lt;/strong&gt;: February 12, 2024&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Winners Announcement&lt;/strong&gt;: February 26, 2024&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  📝 Participation Details
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Submit your contributions via GitHub with the tag &lt;code&gt;#XON-Hackathon-2024&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Find more details and guidelines in our &lt;a href="https://blog.xposedornot.com/xposedornot-hackathon-2024"&gt;official hackathon blog&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This hackathon is not just a competition; it's a chance to make a real difference in the world of internet security. We can't wait to see the innovative solutions you'll bring to the table.&lt;/p&gt;

&lt;p&gt;Feel free to ask questions or share your thoughts in the comments. Let's collaborate to make the internet a safer place for everyone!&lt;/p&gt;

</description>
      <category>hackathon</category>
      <category>opensource</category>
      <category>coding</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
