Understanding Cyber Threat Reconnaissance with MITRE’s PRE-ATT&CK Framework
EASM
Cyberattacks don’t begin with malware; they begin with intelligence. Before a single exploit is launched, threat actors conduct careful reconnaissance,...
Visualisation of attack surface
Attack Surface 101: How well do you know your...
EASM
By now, the term digital footprint shouldn’t be a mystery anymore. We roll our eyes every time we see an...
USA.gov vulnerable to Subdomain takeover
EASM
When checking the USA.gov domain Sweepatic, a brand of Outpost24, discovered with their EASM platform a significant security gap which...
How to analyze metadata and hide it from hackers
EASM
In this post, we’re going to explore the dangers and risks of the tip of a very huge iceberg of...
The dangerous art of subdomain enumeration
EASM
Subdomain enumeration is an essential part of the reconnaissance phase in the cyber kill chain. This is where cyber-attackers map...