Cybersquatting graphic
How to protect your brand from cybersquatting
EASM
For many organizations, fake websites become a major concern when one of their brands, logos or business websites is copied...
Dive into reconnaissance and MITRE’s PRE-ATT&CK
EASM
In this blogpost, we will explain the preparation phase of threat actors. We will explore reconnaissance – the playing field...
Visualisation of attack surface
Attack Surface 101: How well do you know your...
EASM
By now, the term digital footprint shouldn’t be a mystery anymore. We roll our eyes every time we see an...
USA.gov vulnerable to Subdomain takeover
EASM
When checking the USA.gov domain Sweepatic, a brand of Outpost24, discovered with their EASM platform a significant security gap which...
How to analyze metadata and hide it from hackers
EASM
In this post, we’re going to explore the dangers and risks of the tip of a very huge iceberg of...