Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

90 total results found

Rogue Mobile Applications

Fake Social Media Profile

Brand Mentions

User Guide

Welcome to the BrandSek User Guide. This guide is designed to help you navigate and maximize the capabilities of BrandSek's AI-powered platform, specializing in threat intelligence and cybersecurity solutions. Our platform emulates a hacker's perspective to id...

BrandSek Continuous Security Scan

BrandSek is dedicated to ensuring robust security through continuous scanning. This process is designed to proactively identify vulnerabilities and potential threats across all public-facing assets. Scans are performed continuously—at least once per day, with ...

Passive VA Risk Mitigation

Passive Vulnerability

Risk Mitigation Strategies Addressing the vulnerabilities identified through passive vulnerability assessment is crucial for improving an organization's security posture. Here are specific mitigation strategies for each of the key risk areas: 1. Mitigating C...

Subdomain Enumeration

Dangling Subdomains

Subdomain enumeration is the process of discovering valid subdomains for a given domain name. In the context of attack surface management and passive vulnerability assessment, it involves identifying all accessible subdomains associated with an organization's ...

Dangling Subdomains : A Critical Security Risk

Dangling Subdomains

Dangling subdomains, also known as subdomain takeover vulnerabilities, occur when a subdomain's DNS record (typically a CNAME record) points to a resource or service that no longer exists or is no longer under the organization's control. Common Causes Disc...

Securing DNS Infrastructure and Preventing Subdomain Takeovers

Dangling Subdomains

Subdomain management is a critical component of maintaining a secure and resilient online presence. Dangling subdomains, resulting from improper DNS management or decommissioned services, can expose organizations to significant security risks, including subdom...

Understanding Outdated Web Technologies

Outdated Web Technology

What Are Outdated Web Technologies? Outdated web technologies refer to software, frameworks, libraries, or practices used in web development that are no longer current, supported, or considered best practice in the industry. These can include: Web server s...

Risks Associated with Outdated Web Technologies

Outdated Web Technology

When our scanning process identifies outdated web technologies across your organization's subdomains, it's crucial to understand the associated risks. These risks can have significant impacts on your organization's security, performance, and compliance. Sec...

Mitigation Plan for Outdated Web Technologies

Outdated Web Technology

After identifying outdated web technologies across your organization's subdomains, it's crucial to implement a comprehensive mitigation plan. This plan will help address the associated risks and improve your overall security posture. Conduct a Thorough Inve...

SSL Scanning

SSL Certificates

Overview of SSL Certificate Scanning As part of our comprehensive asset discovery and vulnerability assessment process, we scan your organization's digital assets to identify and analyze SSL/TLS certificates. This process helps ensure the security and complia...

Risks Associated with SSL Certificate Issues

SSL Certificates

When our scanning process identifies problems with SSL certificates across your organization's assets, it's crucial to understand the associated risks. These issues can have significant impacts on your security, user trust, and operational continuity. Expir...

Mitigation Plan for SSL Certificate Issues

SSL Certificates

Based on the SSL certificate issues identified during our asset scanning process, we recommend the following mitigation strategies to enhance your organization's security posture and maintain smooth operations. Implement Certificate Lifecycle Management ...

Stolen Credentials: Detection

Stolen Credentials

Stolen credentials refer to user account information (typically usernames or email addresses and passwords) that have been compromised and made available in underground markets or public data dumps. These leaks often result from data breaches of various organi...

Mitigation Plan for Stolen Credentials

Stolen Credentials

When our scanning process identifies stolen credentials associated with your organization in leaked databases, it's crucial to act quickly and implement a comprehensive mitigation strategy. Here's a detailed plan to address this security risk: Immediate Actio...

Malware Infected Machines

Malware Infected Machines

In our ongoing efforts to protect organizations from cyber threats, we employ a comprehensive approach to identify malware credentials that may have been compromised. Our process involves extensive scanning of the dark web and numerous online forums, allowing ...

Mitigation Plan for Malware Credentials

Malware Infected Machines

Upon identifying malware credentials associated with your organization, it's crucial to act swiftly and decisively. The following mitigation plan outlines key steps to address this security risk effectively: Immediate Actions Containment and Isolation I...

Leaked Sessions

Leaked Sessions

Leaked sessions refer to unauthorized access to or exposure of active user sessions in web applications or services. A primary cause of these leaks is the use of infostealer malware, which specifically targets and extracts session data from infected systems. ...

Mitigation Plan for Leaked Sessions Due to Infostealers

Leaked Sessions

 Leaked sessions caused by infostealers represent a critical security risk, as malicious software can extract active session tokens or credentials from infected systems. These stolen tokens can be used to bypass authentication mechanisms, granting attackers un...

Monitoring Source Code Leakage

Source Code leakage

Monitoring platforms such as GitHub, GitLab, Postman, and SwaggerHub for sensitive credentials is essential to prevent unauthorized access and potential data breaches. Here's a structured approach to monitoring these platforms for source code leaks: 1. GitHub...

Monitoring Pastebin for Leaks

Pastebin Search

Monitoring platforms like Pastebin is crucial for identifying data leaks, sensitive information exposure, and other unauthorized content that may have been posted online. With Pastebin often being a go-to platform for hackers and malicious actors to share leak...

Monitoring Personal Information Breaches

Personal Information Breached

Protecting personal information is a top priority in today's digital world, where breaches can expose sensitive data such as names, addresses, Social Security numbers, and more. Monitoring platforms for personal information breaches is essential to identify le...

Monitoring Data Leaks on Telegram

Telegram Monitoring

Telegram, with its encrypted messaging and large user base, has become a platform where personal information leaks can occur, either through public groups, channels, or private messages. Monitoring Telegram for personal information breaches is essential for pr...