Category: Technology

Enhancing Subdomain Enumeration for Large-Scale Recon and ASM Workflows
Subdomain enumeration holds a critical role in our reconnaissance and Attack Surface Management (ASM) workflows. In this blog, we'll dive…

Introducing Free Attack Surface Recon API by RedHunt Labs
Introduction In the ever-evolving landscape of cybersecurity, staying ahead of potential threats is paramount. As the digital realm expands, so…

AntiSquat – An AI-powered solution to prevent typosquatting and phishing
Intro Typosquatting and phishing are quite a headache for businesses. Creating fake websites that look almost identical to legitimate ones…

Introducing BucketLoot – An Automated Cloud Bucket Inspector
RedHunt Labs introduces BucketLoot - a cutting-edge, automated S3-compatible Cloud Object Storage bucket inspector designed to empower users in securing…

6 Reasons You Need to Manage Your External Attack Surface
With technological advancements come new security risks that threaten the confidentiality, integrity, and availability of sensitive information. In this blog…

Attack Surface Management – Risks of an Exposed Docker Image
By default, every image pushed to the Docker Hub through your free account appears in the public registry by default.…

Attack Surface Management – Risks of an Exposed Service / Port
Open ports help applications serve their purpose correctly. However, certain services running on ports exposed to the internet may pose…

OpenSSL v3: Two High-Priority Patches and A Week of Horror
A technical analysis of the two newly released high severity vulnerabilities in OpenSSL, dubbed CVE-2022-3786 and CVE-3602.