Introducing Free Attack Surface Recon API by RedHunt Labs

Introduction In the ever-evolving landscape of cybersecurity, staying ahead of potential threats is paramount. As the digital realm expands, so…
Introducing BucketLoot – An Automated Cloud Bucket Inspector

Introducing BucketLoot – An Automated Cloud Bucket Inspector

RedHunt Labs introduces BucketLoot - a cutting-edge, automated S3-compatible Cloud Object Storage bucket inspector designed to empower users in securing…
6-Reasons-You-Need-to-Manage-Your-External-Attack-Surface-1

6 Reasons You Need to Manage Your External Attack Surface

With technological advancements come new security risks that threaten the confidentiality, integrity, and availability of sensitive information. In this blog…
Attack Surface Management - Risks of an Exposed Docker Image

Attack Surface Management – Risks of an Exposed Docker Image

By default, every image pushed to the Docker Hub through your free account appears in the public registry by default.…

Attack Surface Management – Risks of an Exposed Service / Port 

Open ports help applications serve their purpose correctly. However, certain services running on ports exposed to the internet may pose…
OpenSSL v3: Two High-Priority Patches and A Week of Horror

OpenSSL v3: Two High-Priority Patches and A Week of Horror

A technical analysis of the two newly released high severity vulnerabilities in OpenSSL, dubbed CVE-2022-3786 and CVE-3602.
Thousands of Unsecured Kubernetes Clusters Exposed on the Internet — Wave 9

Thousands of Unsecured Kubernetes Clusters Exposed on the Internet — Wave 9

Wave 9 of Project Resonance was conducted to determine the security posture of the exposed Kubernetes clusters around the internet.…
The Current State of Security, Privacy and Attack Surface on Android: Scanning Apps for Secrets and More – Wave 8

The Current State of Security, Privacy and Attack Surface on Android: Scanning Apps for Secrets and More – Wave 8

Our research shows that secret leakage is still an issue developers must be addressed with secure development practices. We recommend…