How to Avoid Hostile Subdomain Takeovers

Posted by Asaf Aprozper on July 27, 2020 3:33:53 AM EDT

What is a hostile subdomain takeover?

Read More

Topics: "IT Security Audits", "Attack Surface Management", "Security Risk Assessment", Hostile Subdomain Takeover

AWS EC2 Security Starts with Visibility

Posted by Lihi Ben Arie on June 24, 2020 1:35:05 AM EDT

Elastic Compute Cloud (or in short EC2) is an infrastructure-as-a-service offering and one of the widely adopted services in the AWS platform. 

Read More

Topics: "Attack Surface Management", AWS, EC2, Integration, Cyber Security

What Verizon’s 2020 DBIR findings mean for your Attack Surface?

Posted by Reposify on June 4, 2020 6:42:17 AM EDT

The Verizon’s 2020 Data Breach Investigations Report was recently published. This year’s report, all 119 pages of it, are full of interesting insights. Here are the report’s key findings and our take on them.

Read More

Topics: "Attack Surface Management", "Security Risk Assessment", data breach, verizon data breach investigation report 2020, shadow it risks

Risk elimination & score optimization done smart.

Posted by Reposify on June 2, 2020 5:32:12 AM EDT

The Reposify team is pleased to announce the release of Reposify Optimizer - a game changing capability built into Reposify’s Attack Surface Management Platform.

Read More

Topics: "risk assessment", "Attack Surface Management", "Shadow IT", "CVE"

ATTACK SURFACE STATUS - Week 18

Posted by Reposify on May 7, 2020 9:34:56 AM EDT

Millions of sensitive assets are left exposed to the internet every day, leaving organizations attack surfaces vulnerable to various risks which could results in a breach. 

Each week will be sharing fresh data, from Reposify's platform, on the most common exposures, CVEs as well as tips on how to avoid them.

Read More

Topics: "risk assessment", "Attack Surface Management", "Shadow IT", "CVE", "Weekly Patch"

“If I Can't See it it Doesn't Exist” - The blind spots in Your IT Security Risk Assessment

Posted by Koby Meir on April 21, 2020 1:29:31 PM EDT

Cyber security risk assessment is a fundamental building block in any cyber security program. It enables you to identify all the potential risks and security issues that your organization might face and ensure the right policies and tools are put in place to improve your overall security posture.

Read More

Topics: "IT Security Audits", "Attack Surface Management", "Security Risk Assessment"

127% increase in exposed RDPs due to surge in remote work

Posted by Asaf Aprozper on March 30, 2020 1:12:18 PM EDT

Remote access channels are one of the preferred attack vectors for criminals trying to obtain access to organizations’ internal networks. Recently, various vulnerabilities in enterprise VPNs were exploited in the wild during attack campaigns by malicious actors and nation-states.

Read More

Topics: "Respoify IoT Scanner", "Remote Access", "Exposed RDP", "Remote Work"

Is Your Enterprise VPN Secure?

Posted by Yaron Tal on March 18, 2020 5:24:56 AM EDT

In these days of uncertainty, while many, if not most of us are at home trying to balance working remotely and family life, DevOps, IT & security teams are doubling down on their efforts to provide the technical support needed to ensure business continuity. The task at hand presents a unique challenge which for many organizations is uncharted. 

Read More

Topics: "Respoify IoT Scanner", "VPN Security", "Remote Access", "Pulse VPN"

How We Hunted Cyber Criminals on Telegram Using Reposify

Posted by Asaf Aprozper on January 6, 2020 9:24:49 AM EST
 
Read More

Topics: "Yara Rules", "Telegram", "Respoify IoT Scanner"

Reaper – is your network secured against this new IoT botnet?

Posted by Koby Meir on October 20, 2017 12:00:00 AM EDT
One year ago, an army of devices infected with Mirai malware amassed into a botnet that caused some of the largest DDoS attacks to date. The attacks targeted, among others, the major DNS provider Dyn and the website of Brian Krebs, a well-known investigative reporter who covers information security and cyber crime.
Read More

Topics: "Respoify IoT Scanner", "botnet"

Never Miss A Bit!

Stay looped in with the latest in cyber security. 

Sign up for our newsletter!

  • Tap into best practices and tips delivered to your inbox
  • Reveal new vulnerabilities and exposed asset trends
  • Discover external attack surface industry benchmarks
  • Learn about the latest Reposify news

Subscribe Here!

Recent Posts