RedHunt Labs Blog

Octopii - An open-source, PII (Personally Identifiable Information) Scanner for Images

Octopii – An open-source, PII (Personally Identifiable Information) Scanner for Images

Say Hi to Octopii, an AI-powered Personal Identifiable Information scanner that uses Tesseract’s Optical Character Recognition (OCR) and a MobileNet Convolutional Neural Network (CNN) model to detect various forms of Government IDs, passports, debit cards, driver’s licenses, photos, signatures, etc. Let’s take a closer look at how Octopii works and why it’s essential to look out for exposed PII throughout your assets.

Read More
Untracked Assets and their Risks

Untracked Assets and their Risks – Discussion with Cybernews

Nowadays, securing and managing a company’s digital footprint has become an even more difficult challenge. With so many subdomains, code repositories, and applications, some untracked assets are bound to be overlooked. As the attack surface expands, visibility of the complete landscape is essential to keep an organization’s assets safe.

Read More
Project Resonance Wave 6

Internet-Wide Study: State of SPF, DKIM, and DMARC (Wave 6)

At RedHunt Labs, (under Project Resonance), we frequently conduct internet-wide research in different shapes and formats to understand the state of security across the internet. In this iteration, we conducted a study about the current state of DNS configurations (SPF, DKIM and DMARC records) from a security perspective. We scanned more than 2.2 billion domains but before we discuss the insights, let’s quickly go over the basics.

Read More
Octopii - An open-source, PII (Personally Identifiable Information) Scanner for Images
Tool-Release
Owais Shaikh

Octopii – An open-source, PII (Personally Identifiable Information) Scanner for Images

Say Hi to Octopii, an AI-powered Personal Identifiable Information scanner that uses Tesseract’s Optical Character Recognition (OCR) and a MobileNet Convolutional Neural Network (CNN) model to detect various forms of Government IDs, passports, debit cards, driver’s licenses, photos, signatures, etc. Let’s take a closer look at how Octopii works and why it’s essential to look out for exposed PII throughout your assets.

Read More »
Untracked Assets and their Risks
Business
Shubham Mittal

Untracked Assets and their Risks – Discussion with Cybernews

Nowadays, securing and managing a company’s digital footprint has become an even more difficult challenge. With so many subdomains, code repositories, and applications, some untracked assets are bound to be overlooked. As the attack surface expands, visibility of the complete landscape is essential to keep an organization’s assets safe.

Read More »
Project Resonance Wave 6
Technology
Somdev Sangwan

Internet-Wide Study: State of SPF, DKIM, and DMARC (Wave 6)

At RedHunt Labs, (under Project Resonance), we frequently conduct internet-wide research in different shapes and formats to understand the state of security across the internet. In this iteration, we conducted a study about the current state of DNS configurations (SPF, DKIM and DMARC records) from a security perspective. We scanned more than 2.2 billion domains but before we discuss the insights, let’s quickly go over the basics.

Read More »
1 01 1
Business
Shubham Mittal

How Can a Data Breach Affect Brand value?

Studies reveal that a data leak can seriously damage a company’s image and brand value. It can harm the goodwill of a brand and cause a loss of client trust.

As per the Risk Based Security research report, in 2019, over 5000 breaches were reported, exposing 7.9 billion records. A data breach is not just a matter of privacy concern; it concerns all the stakeholders interested in protecting the brand’s name.

Read More »

Explore our Blogs

Share in your network

Share on twitter
Share on linkedin
Share on facebook
Share on reddit
Share on whatsapp
Share on twitter
Tweet
Share on linkedin
LinkedIn
Share on facebook
Facebook
Share on reddit
Reddit
Share on whatsapp
WhatsApp