Identify unknowns in your attack surface and address shadow...
EASM
What does your online footprint look like from the outside? Discover outliers, address shadow IT, consolidate cloud providers and see...
Cybersquatting graphic
How to protect your brand from cybersquatting
EASM
For many organizations, fake websites become a major concern when one of their brands, logos or business websites is copied...
Dive into reconnaissance and MITRE’s PRE-ATT&CK
EASM
In this blogpost, we will explain the preparation phase of threat actors. We will explore reconnaissance – the playing field...
Visualisation of attack surface
Attack Surface 101: How well do you know your...
EASM
By now, the term digital footprint shouldn’t be a mystery anymore. We roll our eyes every time we see an...
USA.gov vulnerable to Subdomain takeover
EASM
When checking the USA.gov domain Sweepatic, a brand of Outpost24, discovered with their EASM platform a significant security gap which...