Visualisation of attack surface
Attack Surface 101: How well do you know your...
EASM
By now, the term digital footprint shouldn’t be a mystery anymore. We roll our eyes every time we see an...
USA.gov vulnerable to Subdomain takeover
EASM
When checking the USA.gov domain Sweepatic, a brand of Outpost24, discovered with their EASM platform a significant security gap which...
How to analyze metadata and hide it from hackers
EASM
In this post, we’re going to explore the dangers and risks of the tip of a very huge iceberg of...
The dangerous art of subdomain enumeration
EASM
Subdomain enumeration is an essential part of the reconnaissance phase in the cyber kill chain. This is where cyber-attackers map...