Log4j Vulnerability - Things You Should Know

Log4j Vulnerability – Things You Should Know

What is Log4j Vulnerability? Apache Log4j is an open source logging framework that allows software developers to log various data…

Scanning Millions of Publicly Exposed Docker Containers – Thousands of Secrets Leaked (Wave 5)

Docker is a popular tool that has become synonymous with containers. Docker can build images and run containers. The tool…

5 Ways to Exploit a Domain Takeover Vulnerability

Domain Takeover occurs when the organization did not renew its domain but still use it in their code and infrastructure.…
RedHunt ASM Platform NVADR now supports SSO and MFA

RedHunt ASM Platform NVADR now supports SSO and MFA

We have been listening to your feedback and we are excited to announce that our Attack Surface Management (ASM) Platform,…

Say Hello to Our New Logo

Today marks an exciting new day for RedHunt Labs. We are officially launching a new brand identity for the company,…
Thousands of Unauthenticated Databases Exposed on the Internet - Wave 4

Thousands of Unauthenticated Databases Exposed on the Internet – Wave 4

Internet-wide research on the security posture of databases exposed on the internet. This blog contains all the specifics and analysis…
9 Cybersecurity Tips for Remote Working

9 Cybersecurity Tips for Remote Working

According to the CISO’s Benchmark Report 2020, businesses are struggling to manage remote workers’ use of phones and other mobile…
10 Most Common Security Issues Found in Login Functionalities

10 Most Common Security Issues Found in Login Functionalities

This blog discusses the common vulnerabilities or misconfigurations that a threat actor can exploit on login functionality & some remediations…