Enhancing Subdomain Enumeration for Large-Scale Recon and ASM Workflows

Enhancing Subdomain Enumeration for Large-Scale Recon and ASM Workflows

Subdomain enumeration holds a critical role in our reconnaissance and Attack Surface Management (ASM) workflows. In this blog, we'll dive…

Introducing Free Attack Surface Recon API by RedHunt Labs

Introduction In the ever-evolving landscape of cybersecurity, staying ahead of potential threats is paramount. As the digital realm expands, so…

AntiSquat – An AI-powered solution to prevent typosquatting and phishing

Intro Typosquatting and phishing are quite a headache for businesses. Creating fake websites that look almost identical to legitimate ones…
Introducing BucketLoot – An Automated Cloud Bucket Inspector

Introducing BucketLoot – An Automated Cloud Bucket Inspector

RedHunt Labs introduces BucketLoot - a cutting-edge, automated S3-compatible Cloud Object Storage bucket inspector designed to empower users in securing…
6-Reasons-You-Need-to-Manage-Your-External-Attack-Surface-1

6 Reasons You Need to Manage Your External Attack Surface

With technological advancements come new security risks that threaten the confidentiality, integrity, and availability of sensitive information. In this blog…
Attack Surface Management - Risks of an Exposed Docker Image

Attack Surface Management – Risks of an Exposed Docker Image

By default, every image pushed to the Docker Hub through your free account appears in the public registry by default.…

Attack Surface Management – Risks of an Exposed Service / Port 

Open ports help applications serve their purpose correctly. However, certain services running on ports exposed to the internet may pose…
OpenSSL v3: Two High-Priority Patches and A Week of Horror

OpenSSL v3: Two High-Priority Patches and A Week of Horror

A technical analysis of the two newly released high severity vulnerabilities in OpenSSL, dubbed CVE-2022-3786 and CVE-3602.