Category: Security Best Practices

Enhancing Subdomain Enumeration for Large-Scale Recon and ASM Workflows
Subdomain enumeration holds a critical role in our reconnaissance and Attack Surface Management (ASM) workflows. In this blog, we'll dive…

AntiSquat – An AI-powered solution to prevent typosquatting and phishing
Intro Typosquatting and phishing are quite a headache for businesses. Creating fake websites that look almost identical to legitimate ones…

Attack Surface Management – Risks of an Exposed Service / Port
Open ports help applications serve their purpose correctly. However, certain services running on ports exposed to the internet may pose…

OpenSSL v3: Two High-Priority Patches and A Week of Horror
A technical analysis of the two newly released high severity vulnerabilities in OpenSSL, dubbed CVE-2022-3786 and CVE-3602.
5 Ways to Exploit a Domain Takeover Vulnerability
Domain Takeover occurs when the organization did not renew its domain but still use it in their code and infrastructure.…

Thousands of Unauthenticated Databases Exposed on the Internet – Wave 4
Internet-wide research on the security posture of databases exposed on the internet. This blog contains all the specifics and analysis…

9 Cybersecurity Tips for Remote Working
According to the CISO’s Benchmark Report 2020, businesses are struggling to manage remote workers’ use of phones and other mobile…

10 Most Common Security Issues Found in Login Functionalities
This blog discusses the common vulnerabilities or misconfigurations that a threat actor can exploit on login functionality & some remediations…