Internet-wide research on the security posture of databases exposed on the internet. This blog contains all the specifics and analysis of results.
According to the CISO’s Benchmark Report 2020, businesses are struggling to manage remote workers’ use of phones and other mobile devices. Here are the work-from-home cybersecurity tips for both employers and employees.
This blog discusses the common vulnerabilities or misconfigurations that a threat actor can exploit on login functionality & some remediations around it.
For any entrepreneur, it becomes tough to manage business operations, cybersecurity of their assets, and customers’ privacy at the same time. Hence, we created this handy cybersecurity guide to manage them all.
In the dependency confusion attacks, a user can be tricked into installing a malicious dependency/library instead of the one they intended to install.
We analyzed 65 million web servers resulting in interesting insights. Also, we are releasing a few datasets from our internet scan results for the community.
We, at RedHunt Labs, focus on reducing your organization’s attack surface, help your organization avoid data breaches and help companies mitigate threats before it is too late?