Internet-wide research on the security posture of databases exposed on the internet. This blog contains all the specifics and analysis of results.
According to the CISO’s Benchmark Report 2020, businesses are struggling to manage remote workers’ use of phones and other mobile devices. Here are the work-from-home cybersecurity tips for both employers and employees.
This blog discusses the common vulnerabilities or misconfigurations that a threat actor can exploit on login functionality & some remediations around it.
In the dependency confusion attacks, a user can be tricked into installing a malicious dependency/library instead of the one they intended to install.
We, at RedHunt Labs, focus on reducing your organization’s attack surface, help your organization avoid data breaches and help companies mitigate threats before it is too late?