Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

90 total results found

Attack Surface

Attack Surface Management (ASM) is a comprehensive cybersecurity approach focused on continuously discovering, analyzing, and monitoring an organization's external-facing digital assets and vulnerabilities.

Darkweb

Data exposure monitoring is a critical component of modern attack surface management (ASM) tools. This feature encompasses the detection and tracking of various forms of information leakage that could pose security risks to an organization. 

Brand Security

Brand security refers to the proactive measures and reactive protocols implemented to safeguard a brand's integrity, value, and public perception across various digital and physical channels.

Email Security

SSL Vulnerability

Threat Actors

BlackListed IP

IP Discovery

Passive Vulnerability

Dangling Subdomains

Outdated Web Technology

SSL Certificates

Stolen Credentials

Malware Infected Machines

Leaked Sessions

Source Code leakage

Pastebin Search

Personal Information Breached

Telegram Monitoring

Postman Monitoring

Open Cloud Buckets

Dark Web Monitoring

Look-alike Domains

A Step-by-Step Guide to Implementing DKIM for Safer Emails

Email Security

Introduction  According to Forbes, more than 300 billion emails are sent daily, of which 90% of spam and malware and just one click on any of these emails can lead to data breaches and ransomware attacks. To avoid these clients and email services, fil...

Fixing Poodle Vulnerability

SSL Vulnerability

The POODLE vulnerability, which stands for Padding Oracle On Downgraded Legacy Encryption, is a vulnerability in the SSL 3.0 protocol that allows an attacker to exploit the way in which the protocol handles padding to extract plaintext secrets from encrypted c...

SSL BREACH Vulnerability?

SSL Vulnerability

The BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) attack is a specific vulnerability targeting HTTP responses compressed using gzip or DEFLATE and encrypted via SSL/TLS. Fixing an SSL BREACH vulnerability requires a co...

Lazarus

Threat Actors

Introduction Lazarus, also known as Hidden Cobra or Zinc, is a North Korean state-sponsored hacking group that has been active since 2009. The group is one of the world’s most active threat actors and has been behind large-scale cyber-espionage and ransomwa...

Akira Ransomware Gang: A Rising Threat to Global Enterprises

Threat Actors

The Akira Ransomware Gang has quickly become a big threat to businesses and organizations, showing a high level of skill and harmful intentions. This article digs into who they are, where they target, what security holes they exploit, which industries they go ...

RC4 SSL Vulnerability

SSL Vulnerability

The RC4 SSL vulnerability refers to security weaknesses in the RC4 stream cipher when it is used in SSL/TLS protocols for encrypting web traffic. RC4 (Rivest Cipher 4) was once widely used due to its simplicity and speed, but over time, several vulnerabilities...

LOGJAM SSL Vulnerability

SSL Vulnerability

The Logjam vulnerability is a security flaw in the TLS protocol that allows attackers to weaken the encryption of HTTPS connections by forcing them to use weak, export-grade cryptography. It specifically targets the Diffie-Hellman key exchange process, exploit...

TLS_FALLBACK_CSV

SSL Vulnerability

The TLS_FALLBACK_SCSV vulnerability addresses a specific issue in SSL/TLS protocols where a client and server could be forced to use a less secure version of the protocol through a downgrade attack. This security mechanism prevents such attacks by allowing the...

Lucky 13 Vulnerability

SSL Vulnerability

Lucky 13 vulnerability is a timing side-channel flaw in the TLS protocol affecting Cipher Block Chaining (CBC) mode ciphers. In this guide, we'll walk through the necessary steps to mitigate this vulnerability and reinforce the security of your network communi...

BEAST Vulnerability

SSL Vulnerability

The BEAST (Browser Exploit Against SSL/TLS) vulnerability is an attack on SSL/TLS 1.0. The vulnerability takes advantage of the way in which blocks of data are encrypted under a specific type of encryption algorithm within the SSL protocol .To mitigate the BEA...

Sweet 32 Vulnerability

SSL Vulnerability

The "SWEET32" vulnerability is an attack on older block cipher encryption schemes that use a 64-bit block size. These ciphers are susceptible to collision attacks when a significant amount of data is transmitted under the same encryption key. In the context of...

Dmarc Records

Email Security

Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that is designed to give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing. The purpose an...

SPF Records

Email Security

The Sender Policy Framework (SPF) is an email authentication method designed to detect forging sender addresses during the delivery of the email. SPF allows the receiving mail server to check during mail delivery that a mail claiming to come from a specific do...

Attack Surface IP Discovery and Asset Identification

IP Discovery

Overview Attack surface management is a critical aspect of cybersecurity that involves identifying, analyzing, and managing an organization's external-facing digital assets. A key component of this process is attack surface IP discovery, which includes scanni...

Risks Associated with Open Ports in IP Discovery

IP Discovery

Overview During attack surface IP discovery, identifying open ports is a critical aspect of understanding an organization's potential vulnerabilities. Open ports, regardless of the specific service they're associated with, can present various risks if not pro...

Remediation for IP Discovery and Open Ports

IP Discovery

Overview Effective remediation of risks associated with IP discovery and open ports is crucial for maintaining a secure attack surface. This document outlines strategies to address vulnerabilities identified during IP asset scanning and port discovery process...

Overview : IP Blacklisting

BlackListed IP

What is IP Blacklisting? IP blacklisting is a security practice where specific IP addresses are blocked from accessing a network, website, or other internet services due to suspicious or malicious activity. When an IP address is blacklisted, it's added to a l...

Implications and Remediation

BlackListed IP

Overview IP blacklisting occurs when an IP address is added to a blocklist due to suspicious or malicious activity. This can severely impact an organization's ability to communicate, send emails, or provide services. Understanding and addressing IP blacklisti...

Passive Vulnerability Assessment

Passive Vulnerability

What is Passive Vulnerability Assessment? Passive vulnerability assessment is a non-intrusive method of identifying potential security weaknesses in an organization's digital assets without actively engaging with the systems or networks. This approach gathers...

Risks Identified in Passive Vulnerability Assessment

Passive Vulnerability

Passive vulnerability assessment is a crucial component of attack surface management. It allows for the identification of potential security weaknesses without actively engaging with the target systems. This knowledge base article focuses on three primary area...