Preface In a recent turn of events, RedHunt Labs’ Attack Surface Management (ASM) research team uncovered a potentially disastrous data leak incident involving the automotive giant, Mercedes-Benz. This incident not…
Tag: attack surface
In the ever-evolving digital landscape, organizations are constantly grappling with the challenge of securing their vast and ever-expanding attack surfaces. An attack surface refers to the collection of assets and…
Nowadays, securing and managing a company’s digital footprint has become an even more difficult challenge. With so many subdomains, code repositories, and applications, some untracked assets are bound to be overlooked. As the attack surface expands, visibility of the complete landscape is essential to keep an organization’s assets safe.
At RedHunt Labs, (under Project Resonance), we frequently conduct internet-wide research in different shapes and formats to understand the state of security across the internet. In this iteration, we conducted a study about the current state of DNS configurations (SPF, DKIM and DMARC records) from a security perspective. We scanned more than 2.2 billion domains but before we discuss the insights, let’s quickly go over the basics.
What is Log4j Vulnerability? Apache Log4j is an open source logging framework that allows software developers to log various data within their application. This data can also include user input….
We, at RedHunt Labs, focus on reducing your organization’s attack surface, help your organization avoid data breaches and help companies mitigate threats before it is too late?