The SolarWinds supply chain attack is one of the most sophisticated cyber attacks the world has witnessed in recent years.
SolarWinds' Attack - Exposed Orion PlatformS are Still Out There
Topics: "Remote Work", "Attack Surface Management", "Security Risk Assessment", SolarWind, Orion Platform, Supply chain attack
We’ve asked Reposify’s cybersecurity experts to share 31 of their best tips for reducing attack surface risks.
Topics: "Respoify IoT Scanner", "Attack Surface Management", "Security Risk Assessment", shadow it risks, Attack Surface
Are You Still Using Shodan to Map Your Attack Surface?
If you are using Shodan to search for your company’s assets or perform reconnaissance as part of blue or red teams routines - you need to keep reading. This blog unlocks insights that will help you eliminate more risks in less time and minimum effort.
Shodan (aka the hackers’ search engine) is a well known Internet search engine which allows you to check the exposure status and meta data of every public IP address. It is used by both hackers and organizations.
Shodan is great for attackers. Having the internet at your fingertips is exactly what you need when trying to find exposed assets to attack. But for organizations it's a different story.
In order to stay ahead of attackers you need a quick way to continuously map and monitor your ever-changing external attack surface. But trying to create an always up-to-date connected asset inventory by using an IoT search engine is like looking for a needle in the haystack while ignoring the rest of the barn. The inherent limitations of Shodan include manual searches, false positives, no prioritization and result in partial visibility of your real attack surface.
The only way to eliminate shadow IT risks and unknown exposures is through complete automation of the discovery, analysis, prioritization and monitoring processes.
10 years ago, Shodan was probably your best option, but today in 2020, using Shodan to search for your company’s assets is like trying to navigate at sea, with no GPS or sonars, relying only on the stars.
This blog presents a deep dive comparison of the use of Shodan vs Reposify’s External Attack Surface Management platform for mapping the attack surface and eliminating unknown risks .
We’ll examine and compare 4 main aspects:
1. Internet scanning capabilities
2. Asset discovery capabilities
3. Insights actionability (asset classification, security insights and risk prioritization)
4. Costs - is Shodan really that cheap?
Spoiler Alert
Topics: "Respoify IoT Scanner", "IT Security Audits", "Attack Surface Management", "Security Risk Assessment", IoT Search Engine
Topics: "IT Security Audits", "Attack Surface Management", "Security Risk Assessment", Hostile Subdomain Takeover
What Verizon’s 2020 DBIR findings mean for your Attack Surface?
The Verizon’s 2020 Data Breach Investigations Report was recently published. This year’s report, all 119 pages of it, are full of interesting insights. Here are the report’s key findings and our take on them.
Topics: "Attack Surface Management", "Security Risk Assessment", data breach, verizon data breach investigation report 2020, shadow it risks
“If I Can't See it it Doesn't Exist” - The blind spots in Your IT Security Risk Assessment
Cyber security risk assessment is a fundamental building block in any cyber security program. It enables you to identify all the potential risks and security issues that your organization might face and ensure the right policies and tools are put in place to improve your overall security posture.
Topics: "IT Security Audits", "Attack Surface Management", "Security Risk Assessment"