Tag: IT security Audits

If you are using Shodan to search for your company’s assets or perform reconnaissance as part of blue or red teams routines - you need to keep reading.
External Attack Surface Management
A hostile subdomain takeover is a situation in which an attacker is able to take over an official subdomain of a company and use it to carry out various types of attacks. How does it happen?
External Attack Surface Management
Koby Meir
Cyber security risk assessment is fundamental in any security program. It enables you to identify all the potential risks your organization might face and ensure the right policies are put in place to improve your security posture
Attack Surface Management