Attack Surface Management
Attack Surface Reduction for Enterprises: A Guide
Today’s enterprises have embraced digital evolution. Business deals are conducted in online spaces, contracts are signed with a keyboard, data is held in physical servers and the cloud, and client ...

Why EASM Projects Fail: Three Pitfalls to AvoidÂ
If you avoid the pitfalls detailed in this article, then EASM can provide a great defense against two-thirds of your breach problem. ...
Prophylactic Cybersecurity for Healthcare
How to Be Proactive in a Reactive World In healthcare, preventative medicine is always more effective, less costly, and has better outcomes than waiting until after a serious heart incident occurs. It’s ...

IONIX Unveils Parked Domain ClassificationÂ
IONIX is proud to announce the launch of our new Parked Domain Classification capability within our Exposure Management platform. This feature enables security teams to intelligently categorize and monitor parked domains as ...

Searchlight Cyber Acquires Assetnote to Accelerate Remediation
Searchlight Cyber this week revealed it has acquired Assetnote as part of an effort to unify attack surface management with its platform for detecting stolen data that has been published on the ...

Introducing BloodHound CLI
We created a new tool to help you install and manage BloodHound instances, BloodHound CLI!GitHub - SpecterOps/bloodhound-cliWritten entirely in Go, this command-line tool can be cross-compiled to support Windows, macOS, and Linux, ...
Three Pillars for MSSP Success in EASM
The External Attack Surface Management (EASM) domain is rapidly growing in importance for businesses across the globe. Organizations must strive to understand the true scope of their attack surface as seen through ...
Exploited! Kerio Control’s HTTP Response Splitting Vulnerability (CVE-2024-52875)
IONIX is tracking CVE-2024-52875 and related vulnerabilities for Kerio Control: This post is based on ongoing security research – and will continue to be updated as we get additional information… What is ...
Exploited! NuPoint Unified Messaging (NPM) Component of Mitel MiCollab
IONIX is tracking CVE-2024-41713 and related vulnerabilities for Mitel MiCollab NPM: This post is based on ongoing security research – and will continue to be updated as we get additional information… What ...

Strobes Integrates with Azure Repos: Enhancing Code Security
As software development reaches new heights, ensuring the security and management of your code is more crucial than ever. Seeing the need of the hour, Strobes CTEM is now integrated... The post ...