RedHunt Labs Blog

How-Can-Data-Breach-Affect-Brand-value

How Can a Data Breach Affect Brand value?

Studies reveal that a data leak can seriously damage a company’s image and brand value. It can harm the goodwill of a brand and cause a loss of client trust.

As per the Risk Based Security research report, in 2019, over 5000 breaches were reported, exposing 7.9 billion records. A data breach is not just a matter of privacy concern; it concerns all the stakeholders interested in protecting the brand’s name.

Read More
Scanning Millions of Publicly Exposed Docker Containers – Thousands of Secrets Leaked

Scanning Millions of Publicly Exposed Docker Containers – Thousands of Secrets Leaked

Docker is a popular tool that has become synonymous with containers. Docker can build images and run containers. The tool also allows its users to upload their docker images to Docker Hub – the container image registry from Docker Inc. that helps share images. Docker Hub allows free public repositories for images.  

During this research, we found more than 1.6 million unique user accounts on Docker Hub. There are more than 6.3 million public repositories at the time of writing this blog. 

Read More
5 Ways to Exploit Domain Takeover Vulnerability

5 Ways to Exploit a Domain Takeover Vulnerability

Domain Takeover occurs when the organization did not renew its domain but still use it in their code and infrastructure. When the attacker registers the abandoned domain, they own the domain, including its subdomains and other types of DNS records.

Read More
How-Can-Data-Breach-Affect-Brand-value
Business
Shubham Mittal

How Can a Data Breach Affect Brand value?

Studies reveal that a data leak can seriously damage a company’s image and brand value. It can harm the goodwill of a brand and cause a loss of client trust.

As per the Risk Based Security research report, in 2019, over 5000 breaches were reported, exposing 7.9 billion records. A data breach is not just a matter of privacy concern; it concerns all the stakeholders interested in protecting the brand’s name.

Read More »
Scanning Millions of Publicly Exposed Docker Containers – Thousands of Secrets Leaked
Project Resonance
redhuntresearcher

Scanning Millions of Publicly Exposed Docker Containers – Thousands of Secrets Leaked

Docker is a popular tool that has become synonymous with containers. Docker can build images and run containers. The tool also allows its users to upload their docker images to Docker Hub – the container image registry from Docker Inc. that helps share images. Docker Hub allows free public repositories for images.  

During this research, we found more than 1.6 million unique user accounts on Docker Hub. There are more than 6.3 million public repositories at the time of writing this blog. 

Read More »
5 Ways to Exploit Domain Takeover Vulnerability
Pentesting
Yash Anand

5 Ways to Exploit a Domain Takeover Vulnerability

Domain Takeover occurs when the organization did not renew its domain but still use it in their code and infrastructure. When the attacker registers the abandoned domain, they own the domain, including its subdomains and other types of DNS records.

Read More »
Blog post 18
News & Announcements
Shubham Mittal

RedHunt ASM Platform NVADR now supports SSO and MFA

We have been listening to your feedback and we are excited to announce that our Attack Surface Management (ASM) Platform, NVADR, now supports SSO (Single Sign On) and MFA (Multi Factor Authentication). This capability has been turned on for all the users and we support SSO for Google Suite, Microsoft Office 365, and LinkedIn for simple and secure identity management via Auth0.

Read More »
RedHunt Labs - Attack Surface Management
News & Announcements
Keerthika Jayaram

Say Hello to Our New Logo

Today marks an exciting new day for RedHunt Labs. We are officially launching a new brand identity for the company, positioning us more accurately as the team we’ve evolved and grown to be.

While we have a new modernized and simplified logo to have a fresh look, our new brand identity simply reflects who we are today and our focus on helping clients secure their data and assets.

Read More »

Explore our Blogs

Share in your network

Share on twitter
Share on linkedin
Share on facebook
Share on reddit
Share on whatsapp
Share on twitter
Tweet
Share on linkedin
LinkedIn
Share on facebook
Facebook
Share on reddit
Reddit
Share on whatsapp
WhatsApp