Introducing Free Attack Surface Recon API by RedHunt Labs

Introduction In the ever-evolving landscape of cybersecurity, staying ahead of potential threats is paramount. As the digital realm expands, so…
Introducing BucketLoot – An Automated Cloud Bucket Inspector

Introducing BucketLoot – An Automated Cloud Bucket Inspector

RedHunt Labs introduces BucketLoot - a cutting-edge, automated S3-compatible Cloud Object Storage bucket inspector designed to empower users in securing…
6-Reasons-You-Need-to-Manage-Your-External-Attack-Surface-1

6 Reasons You Need to Manage Your External Attack Surface

With technological advancements come new security risks that threaten the confidentiality, integrity, and availability of sensitive information. In this blog…
Attack Surface Management - Risks of an Exposed Docker Image

Attack Surface Management – Risks of an Exposed Docker Image

By default, every image pushed to the Docker Hub through your free account appears in the public registry by default.…

Analysing Misconfigured Firebase Apps: A Tale of Unearthing Data Breaches (Wave 10)

Introduction In the last few years, Data breaches have been on the rise. Apart from the web servers, mobile applications…

Attack Surface Management – Risks of an Exposed Service / Port 

Open ports help applications serve their purpose correctly. However, certain services running on ports exposed to the internet may pose…
OpenSSL v3: Two High-Priority Patches and A Week of Horror

OpenSSL v3: Two High-Priority Patches and A Week of Horror

A technical analysis of the two newly released high severity vulnerabilities in OpenSSL, dubbed CVE-2022-3786 and CVE-3602.
Thousands of Unsecured Kubernetes Clusters Exposed on the Internet — Wave 9

Thousands of Unsecured Kubernetes Clusters Exposed on the Internet — Wave 9

Wave 9 of Project Resonance was conducted to determine the security posture of the exposed Kubernetes clusters around the internet.…