Category: Security

EASM vs. PT vs. VM & Defender EASM Approaches

Many times people asked me about the differences between external attack surface management, vulnerability management, and penetration testing. Mostly “What will be the and the right approach to handling security tools alongside the behavior and procedures. While many organization has … Read the rest

Advanced Hunting 4 ZIP/MOV

If you heard a noise on social media from May (2023), it’s probably the same noise that most of us heard: the announcement of specific domains by Google.

Google Registry announced eight new top-level domains (TLDs) that day: .esq, .foo, … Read the rest

The State of External Attack Surface Management

Cybersecurity adores fancy words and buzz…, and you’re in for another joy – ASM, DRP, EASM, CAASM.

This blog post provides additional information on the state of external attack surface management, and it’s related tools and technologies.

Why the External … Read the rest