Blog

How Can a Data Breach Affect Brand value?

How Can a Data Breach Affect Brand value?

Studies reveal that a data leak can seriously damage a company's image and brand value. It can harm the goodwill…
Log4j Vulnerability - Things You Should Know

Log4j Vulnerability – Things You Should Know

What is Log4j Vulnerability? Apache Log4j is an open source logging framework that allows software developers to log various data…

Scanning Millions of Publicly Exposed Docker Containers – Thousands of Secrets Leaked (Wave 5)

Docker is a popular tool that has become synonymous with containers. Docker can build images and run containers. The tool…

5 Ways to Exploit a Domain Takeover Vulnerability

Domain Takeover occurs when the organization did not renew its domain but still use it in their code and infrastructure.…
RedHunt ASM Platform NVADR now supports SSO and MFA

RedHunt ASM Platform NVADR now supports SSO and MFA

We have been listening to your feedback and we are excited to announce that our Attack Surface Management (ASM) Platform,…

Say Hello to Our New Logo

Today marks an exciting new day for RedHunt Labs. We are officially launching a new brand identity for the company,…
Thousands of Unauthenticated Databases Exposed on the Internet - Wave 4

Thousands of Unauthenticated Databases Exposed on the Internet – Wave 4

Internet-wide research on the security posture of databases exposed on the internet. This blog contains all the specifics and analysis…
9 Cybersecurity Tips for Remote Working

9 Cybersecurity Tips for Remote Working

According to the CISO’s Benchmark Report 2020, businesses are struggling to manage remote workers’ use of phones and other mobile…