31 TIPS FOR REDUCING ATTACK SURFACE RISKS

Posted by Reposify on September 21, 2020 8:21:32 AM EDT

We’ve asked Reposify’s cybersecurity experts to share 31 of their best tips for reducing attack surface risks.

Read More

Topics: "Respoify IoT Scanner", "Attack Surface Management", "Security Risk Assessment", shadow it risks, Attack Surface

Are You Still Using Shodan to Map Your Attack Surface?

Posted by Reposify on August 19, 2020 8:41:42 AM EDT

If you are using Shodan to search for your company’s assets or perform reconnaissance as part of blue or red teams routines - you need to keep reading. This blog unlocks insights that will help you eliminate more risks in less time and minimum effort.

Shodan (aka the hackers’ search engine) is a well known Internet search engine which allows you to check the exposure status and meta data of every public IP address. It is used by both hackers and organizations.

Shodan is great for attackers. Having the internet at your fingertips is exactly what you need when trying to find exposed assets to attack. But for organizations it's a different story.

In order to stay ahead of attackers you need a quick way to continuously map and monitor your ever-changing external attack surface. But trying to create an always up-to-date connected asset inventory by using an IoT search engine is like looking for a needle in the haystack while ignoring the rest of the barn. The inherent limitations of Shodan include manual searches, false positives, no prioritization and result in partial visibility of your real attack surface.

The only way to eliminate shadow IT risks and unknown exposures is through complete automation of the discovery, analysis, prioritization and monitoring processes.

10 years ago, Shodan was probably your best option, but today in 2020, using Shodan to search for your company’s assets is like trying to navigate at sea, with no GPS or sonars, relying only on the stars.

This blog presents a deep dive comparison of the use of Shodan vs Reposify’s External Attack Surface Management platform for mapping the attack surface and eliminating unknown risks .

We’ll examine and compare 4 main aspects:
1. Internet scanning capabilities
2. Asset discovery capabilities
3. Insights actionability (asset classification, security insights and risk prioritization)
4. Costs - is Shodan really that cheap?

Spoiler Alert 

Read More

Topics: "Respoify IoT Scanner", "IT Security Audits", "Attack Surface Management", "Security Risk Assessment", IoT Search Engine

127% increase in exposed RDPs due to surge in remote work

Posted by Asaf Aprozper on March 30, 2020 1:12:18 PM EDT

Remote access channels are one of the preferred attack vectors for criminals trying to obtain access to organizations’ internal networks. Recently, various vulnerabilities in enterprise VPNs were exploited in the wild during attack campaigns by malicious actors and nation-states.

Read More

Topics: "Respoify IoT Scanner", "Remote Access", "Exposed RDP", "Remote Work"

Is Your Enterprise VPN Secure?

Posted by Yaron Tal on March 18, 2020 5:24:56 AM EDT

In these days of uncertainty, while many, if not most of us are at home trying to balance working remotely and family life, DevOps, IT & security teams are doubling down on their efforts to provide the technical support needed to ensure business continuity. The task at hand presents a unique challenge which for many organizations is uncharted. 

Read More

Topics: "Respoify IoT Scanner", "VPN Security", "Remote Access", "Pulse VPN"

How We Hunted Cyber Criminals on Telegram Using Reposify

Posted by Asaf Aprozper on January 6, 2020 9:24:49 AM EST
 
Read More

Topics: "Yara Rules", "Telegram", "Respoify IoT Scanner"

Reaper – is your network secured against this new IoT botnet?

Posted by Koby Meir on October 20, 2017 12:00:00 AM EDT
One year ago, an army of devices infected with Mirai malware amassed into a botnet that caused some of the largest DDoS attacks to date. The attacks targeted, among others, the major DNS provider Dyn and the website of Brian Krebs, a well-known investigative reporter who covers information security and cyber crime.
Read More

Topics: "Respoify IoT Scanner", "botnet"