RedHunt Labs Blogs

Dive Deeper:
Uncover Insights in Our Latest Blogs

RedHunt ASM Platform NVADR now supports SSO and MFA
News & Announcements

RedHunt ASM Platform NVADR now supports SSO and MFA

We have been listening to your feedback and we are excited to announce that our Attack Surface Management (ASM) Platform, NVADR, now supports SSO (Single Sign On) and MFA (Multi ...

Business

Say Hello to Our New Logo

Today marks an exciting new day for RedHunt Labs. We are officially launching a new brand identity for the company, positioning us more accurately as the team we’ve evolved and ...

Project Resonance

Thousands of Unauthenticated Databases Exposed on the Internet | Wave 4 | Project Resonace

Internet-wide research on the security posture of databases exposed on the internet. This blog contains all the specifics and analysis of results.

9 Cybersecurity Tips for Remote Working
CISOGuides

9 Cybersecurity Tips for Remote Working

According to the CISO’s Benchmark Report 2020, businesses are struggling to manage remote workers’ use of phones and other mobile devices. Here are the work-from-home cybersecurity tips for both employers ...

10 Most Common Security Issues Found in Login Functionalities
Pentesting

10 Most Common Security Issues Found in Login Functionalities

This blog discusses the common vulnerabilities or misconfigurations that a threat actor can exploit on login functionality & some remediations around it.

Business

The Cybersecurity Guide for an Entrepreneur

For any entrepreneur, it becomes tough to manage business operations, cybersecurity of their assets, and customers’ privacy at the same time. Hence, we created this handy cybersecurity guide to manage ...

Project Resonance

Top Organizations on GitHub Vulnerable to Dependency Confusion Attacks | Wave 3 | Project Resonance

We analyzed the top 1,000 GitHub organizations. It involved scanning 38,691 GitHub repositories (Ruby, Python, JavaScript, Go, and PHP code).

Dependency Confusion Attack - What, Why, and How?
CISOGuides

Dependency Confusion Attack – What, Why, and How?

In the dependency confusion attacks, a user can be tricked into installing a malicious dependency/library instead of the one they intended to install.

Project Resonance

Analysis of Internet Wide Web Servers | Wave 2 | Project Resonance

We analyzed 65 million web servers resulting in interesting insights. Also, we are releasing a few datasets from our internet scan results for the community.

Security Best Practices

Five Ways to Avoid Data Breaches

We, at RedHunt Labs, focus on reducing your organization's attack surface, help your organization avoid data breaches and help companies mitigate threats before it is too late?

Business

Internet-Wide Analysis of Subdomain Takeovers | Wave 1 | Project Resonance

This blog post is about misconfigured CNAME records that can cause subdomain takeovers on a massive scale.

Pentesting

Burp Suite Extension – Asset History [Tool Release]

Burp Suite extension to identify the historic URLs of the domains in scope from WayBackMachine. Helps in Attack Surface Management.

Subscribe to our newsletter &
stay updated.

Don't miss anything. Get all the latest posts delivered straight to your inbox.
It's free!