Blog

How Can a Data Breach Affect Brand value?
Studies reveal that a data leak can seriously damage a company's image and brand value. It can harm the goodwill…

Log4j Vulnerability – Things You Should Know
What is Log4j Vulnerability? Apache Log4j is an open source logging framework that allows software developers to log various data…

Scanning Millions of Publicly Exposed Docker Containers – Thousands of Secrets Leaked (Wave 5)
Docker is a popular tool that has become synonymous with containers. Docker can build images and run containers. The tool…
5 Ways to Exploit a Domain Takeover Vulnerability
Domain Takeover occurs when the organization did not renew its domain but still use it in their code and infrastructure.…

RedHunt ASM Platform NVADR now supports SSO and MFA
We have been listening to your feedback and we are excited to announce that our Attack Surface Management (ASM) Platform,…

Say Hello to Our New Logo
Today marks an exciting new day for RedHunt Labs. We are officially launching a new brand identity for the company,…

Thousands of Unauthenticated Databases Exposed on the Internet – Wave 4
Internet-wide research on the security posture of databases exposed on the internet. This blog contains all the specifics and analysis…

9 Cybersecurity Tips for Remote Working
According to the CISO’s Benchmark Report 2020, businesses are struggling to manage remote workers’ use of phones and other mobile…