RedHunt Labs Blog

5 Ways to Exploit a Domain Takeover Vulnerability

5 Ways to Exploit a Domain Takeover Vulnerability

Domain Takeover occurs when the organization did not renew its domain but still use it in their code and infrastructure. When the attacker registers the abandoned domain, they own the domain, including its subdomains and other types of DNS records.

Read More
RedHunt ASM Platform NVADR now supports SSO and MFA

RedHunt ASM Platform NVADR now supports SSO and MFA

We have been listening to your feedback and we are excited to announce that our Attack Surface Management (ASM) Platform, NVADR, now supports SSO (Single Sign On) and MFA (Multi Factor Authentication). This capability has been turned on for all the users and we support SSO for Google Suite, Microsoft Office 365, and LinkedIn for simple and secure identity management via Auth0.

Read More
Say Hello to Our New Logo

Say Hello to Our New Logo

Today marks an exciting new day for RedHunt Labs. We are officially launching a new brand identity for the company, positioning us more accurately as the team we’ve evolved and grown to be.

While we have a new modernized and simplified logo to have a fresh look, our new brand identity simply reflects who we are today and our focus on helping clients secure their data and assets.

Read More
9 Cybersecurity Tips for Remote Working

9 Cybersecurity Tips for Remote Working

According to the CISO’s Benchmark Report 2020, businesses are struggling to manage remote workers’ use of phones and other mobile devices. Here are the work-from-home cybersecurity tips for both employers and employees.

Read More
9 Cybersecurity Tips for Remote Working
Security Best Practices
saketh

9 Cybersecurity Tips for Remote Working

According to the CISO’s Benchmark Report 2020, businesses are struggling to manage remote workers’ use of phones and other mobile devices. Here are the work-from-home cybersecurity tips for both employers and employees.

Read More »
The Cybersecurity Guide for an Entrepreneur
CISOGuides
saketh

The Cybersecurity Guide for an Entrepreneur

For any entrepreneur, it becomes tough to manage business operations, cybersecurity of their assets, and customers’ privacy at the same time. Hence, we created this handy cybersecurity guide to manage them all.

Read More »

Explore our Blogs

Share in your network

Tweet
LinkedIn
Facebook
Reddit
WhatsApp