#attacksurface — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #attacksurface, aggregated by home.social.
-
Advanced Subdomain Discovery with Amass and Cheat Sheet
In this cheat sheet, I cover essential Amass commands, enumeration techniques, and practical workflows for effective recon.
https://denizhalil.com/2026/05/02/owasp-amass-subdomain-enumeration-cheat-sheet/#CyberSecurity #OWASP #Amass #SubdomainEnumeration #Recon #OSINT #AttackSurface #BugBounty
-
Advanced Subdomain Discovery with Amass and Cheat Sheet
In this cheat sheet, I cover essential Amass commands, enumeration techniques, and practical workflows for effective recon.
https://denizhalil.com/2026/05/02/owasp-amass-subdomain-enumeration-cheat-sheet/#CyberSecurity #OWASP #Amass #SubdomainEnumeration #Recon #OSINT #AttackSurface #BugBounty
-
Advanced Subdomain Discovery with Amass and Cheat Sheet
In this cheat sheet, I cover essential Amass commands, enumeration techniques, and practical workflows for effective recon.
https://denizhalil.com/2026/05/02/owasp-amass-subdomain-enumeration-cheat-sheet/#CyberSecurity #OWASP #Amass #SubdomainEnumeration #Recon #OSINT #AttackSurface #BugBounty
-
Subdomain Takeover Vulnerabilities and Prevention
In this article, I cover:
* How subdomain takeover vulnerabilities occur
* Real-world exploitation scenarios
Reconnaissance and detection techniques
* Practical prevention and DNS hygiene strategieshttps://denizhalil.com/2026/02/16/subdomain-takeover-vulnerabilities-prevention/
#CyberSecurity #SubdomainTakeover #DNS #AttackSurface #BugBounty #RedTeam #BlueTeam #InfoSec #CloudSecurity #WebSecurity #EthicalHacking
-
Subdomain Takeover Vulnerabilities and Prevention
In this article, I cover:
* How subdomain takeover vulnerabilities occur
* Real-world exploitation scenarios
Reconnaissance and detection techniques
* Practical prevention and DNS hygiene strategieshttps://denizhalil.com/2026/02/16/subdomain-takeover-vulnerabilities-prevention/
#CyberSecurity #SubdomainTakeover #DNS #AttackSurface #BugBounty #RedTeam #BlueTeam #InfoSec #CloudSecurity #WebSecurity #EthicalHacking
-
Subdomain Takeover Vulnerabilities and Prevention
In this article, I cover:
* How subdomain takeover vulnerabilities occur
* Real-world exploitation scenarios
Reconnaissance and detection techniques
* Practical prevention and DNS hygiene strategieshttps://denizhalil.com/2026/02/16/subdomain-takeover-vulnerabilities-prevention/
#CyberSecurity #SubdomainTakeover #DNS #AttackSurface #BugBounty #RedTeam #BlueTeam #InfoSec #CloudSecurity #WebSecurity #EthicalHacking
-
The Real Problem Isn't That #AI Can't Write #SecureCode - It's That It's Expanding #AttackSurface
https://thehackernews.com/expert-insights/2026/03/the-real-problem-isnt-that-ai-cant.html
-
The Real Problem Isn't That #AI Can't Write #SecureCode - It's That It's Expanding #AttackSurface
https://thehackernews.com/expert-insights/2026/03/the-real-problem-isnt-that-ai-cant.html
-
The Real Problem Isn't That #AI Can't Write #SecureCode - It's That It's Expanding #AttackSurface
https://thehackernews.com/expert-insights/2026/03/the-real-problem-isnt-that-ai-cant.html
-
The Real Problem Isn't That #AI Can't Write #SecureCode - It's That It's Expanding #AttackSurface
https://thehackernews.com/expert-insights/2026/03/the-real-problem-isnt-that-ai-cant.html
-
The Real Problem Isn't That #AI Can't Write #SecureCode - It's That It's Expanding #AttackSurface
https://thehackernews.com/expert-insights/2026/03/the-real-problem-isnt-that-ai-cant.html
-
#OSINT, #BugBounty, #Pentesting, #CyberSecurity, #Infosec, #OriginServer, #CDNDetection, #DNSHistory, #SSLForensics, #FaviconFingerprinting, #AttackSurface, #InfrastructureAnalysis, #WebSecurity, #NetworkReconnaissance, #ThreatIntelligence, #SecurityResearch, #CloudSecurity, #ServerDiscovery, #DigitalForensics, #VulnerabilityAssessment
-
#OSINT, #BugBounty, #Pentesting, #CyberSecurity, #Infosec, #OriginServer, #CDNDetection, #DNSHistory, #SSLForensics, #FaviconFingerprinting, #AttackSurface, #InfrastructureAnalysis, #WebSecurity, #NetworkReconnaissance, #ThreatIntelligence, #SecurityResearch, #CloudSecurity, #ServerDiscovery, #DigitalForensics, #VulnerabilityAssessment
-
#OSINT, #BugBounty, #Pentesting, #CyberSecurity, #Infosec, #OriginServer, #CDNDetection, #DNSHistory, #SSLForensics, #FaviconFingerprinting, #AttackSurface, #InfrastructureAnalysis, #WebSecurity, #NetworkReconnaissance, #ThreatIntelligence, #SecurityResearch, #CloudSecurity, #ServerDiscovery, #DigitalForensics, #VulnerabilityAssessment
-
#OSINT, #BugBounty, #Pentesting, #CyberSecurity, #Infosec, #OriginServer, #CDNDetection, #DNSHistory, #SSLForensics, #FaviconFingerprinting, #AttackSurface, #InfrastructureAnalysis, #WebSecurity, #NetworkReconnaissance, #ThreatIntelligence, #SecurityResearch, #CloudSecurity, #ServerDiscovery, #DigitalForensics, #VulnerabilityAssessment
-
#OSINT, #BugBounty, #Pentesting, #CyberSecurity, #Infosec, #OriginServer, #CDNDetection, #DNSHistory, #SSLForensics, #FaviconFingerprinting, #AttackSurface, #InfrastructureAnalysis, #WebSecurity, #NetworkReconnaissance, #ThreatIntelligence, #SecurityResearch, #CloudSecurity, #ServerDiscovery, #DigitalForensics, #VulnerabilityAssessment
New Product
https://shoppy.gg/product/PvKQaT9
To fix this, the origin server should be restricted to accept traffic only from Cloudflare IP ranges.
Real log
-
🔐 Identity compromise and reconnaissance are precursors to deeper breaches and targeted operations. Understanding this shift informs threat modeling and operational OPSEC. The latest index data only just published and signals a shift in attacker prioritization not yet widely reported.
https://industrialcyber.co/reports/ibm-x-force-reports-44-surge-in-exploitation-of-public-facing-applications-as-supply-chain-and-identity-attacks-intensify/ #AttackSurface
-
🔐 Identity compromise and reconnaissance are precursors to deeper breaches and targeted operations. Understanding this shift informs threat modeling and operational OPSEC. The latest index data only just published and signals a shift in attacker prioritization not yet widely reported.
https://industrialcyber.co/reports/ibm-x-force-reports-44-surge-in-exploitation-of-public-facing-applications-as-supply-chain-and-identity-attacks-intensify/ #AttackSurface
-
🔐 Identity compromise and reconnaissance are precursors to deeper breaches and targeted operations. Understanding this shift informs threat modeling and operational OPSEC. The latest index data only just published and signals a shift in attacker prioritization not yet widely reported.
https://industrialcyber.co/reports/ibm-x-force-reports-44-surge-in-exploitation-of-public-facing-applications-as-supply-chain-and-identity-attacks-intensify/ #AttackSurface
-
Security Advisory Summary:
SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
• CVE-2025-40538 – Broken access control → system admin creation + root RCE
• Two type confusion flaws → root code execution
• One IDOR vulnerability → elevated executionAttack prerequisites:
High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.Exposure landscape:
12K+ internet-facing instances observed (Shodan)
File transfer platforms remain ransomware-favored entry vectorsHistorical context:
Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.Immediate actions:
- Patch to 15.5.4
- Audit privileged accounts
- Review FTP/SFTP exposure
- Monitor for anomalous admin creationFollow us for tactical advisories and vulnerability intelligence.
Comment with your detection or hardening recommendations.
#Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust
-
Security Advisory Summary:
SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
• CVE-2025-40538 – Broken access control → system admin creation + root RCE
• Two type confusion flaws → root code execution
• One IDOR vulnerability → elevated executionAttack prerequisites:
High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.Exposure landscape:
12K+ internet-facing instances observed (Shodan)
File transfer platforms remain ransomware-favored entry vectorsHistorical context:
Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.Immediate actions:
- Patch to 15.5.4
- Audit privileged accounts
- Review FTP/SFTP exposure
- Monitor for anomalous admin creationFollow us for tactical advisories and vulnerability intelligence.
Comment with your detection or hardening recommendations.
#Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust
-
Security Advisory Summary:
SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
• CVE-2025-40538 – Broken access control → system admin creation + root RCE
• Two type confusion flaws → root code execution
• One IDOR vulnerability → elevated executionAttack prerequisites:
High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.Exposure landscape:
12K+ internet-facing instances observed (Shodan)
File transfer platforms remain ransomware-favored entry vectorsHistorical context:
Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.Immediate actions:
- Patch to 15.5.4
- Audit privileged accounts
- Review FTP/SFTP exposure
- Monitor for anomalous admin creationFollow us for tactical advisories and vulnerability intelligence.
Comment with your detection or hardening recommendations.
#Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust
-
Security Advisory Summary:
SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
• CVE-2025-40538 – Broken access control → system admin creation + root RCE
• Two type confusion flaws → root code execution
• One IDOR vulnerability → elevated executionAttack prerequisites:
High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.Exposure landscape:
12K+ internet-facing instances observed (Shodan)
File transfer platforms remain ransomware-favored entry vectorsHistorical context:
Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.Immediate actions:
- Patch to 15.5.4
- Audit privileged accounts
- Review FTP/SFTP exposure
- Monitor for anomalous admin creationFollow us for tactical advisories and vulnerability intelligence.
Comment with your detection or hardening recommendations.
#Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust
-
https://www.youtube.com/watch?v=x3G_XszX0ec
SecPoint® Penetrator™ – New Target World Map Visualization
Learn more about the SecPoint® Penetrator Vulnerability Scanner:
https://www.secpoint.com/penetrator.htmlPartner sign up:
https://www.secpoint.com/partner-signup.html#SecPoint #CyberSecurity #VulnerabilityScanning #AttackSurface #NetworkSecurity
-
https://www.youtube.com/watch?v=x3G_XszX0ec
SecPoint® Penetrator™ – New Target World Map Visualization
Learn more about the SecPoint® Penetrator Vulnerability Scanner:
https://www.secpoint.com/penetrator.htmlPartner sign up:
https://www.secpoint.com/partner-signup.html#SecPoint #CyberSecurity #VulnerabilityScanning #AttackSurface #NetworkSecurity
-
Active exploitation is being observed via misconfigured security testing applications, enabling attackers to move from exposed training tools into cloud environments.
The issue centers on excessive IAM permissions, default credentials, and poor isolation between test and sensitive systems - not novel malware.
This reinforces the need to treat non-production assets as part of the threat surface.
Follow @technadu for neutral, research-driven security reporting.
#CloudSecurity #IAM #Pentesting #Infosec #AttackSurface #TechNadu
-
Active exploitation is being observed via misconfigured security testing applications, enabling attackers to move from exposed training tools into cloud environments.
The issue centers on excessive IAM permissions, default credentials, and poor isolation between test and sensitive systems - not novel malware.
This reinforces the need to treat non-production assets as part of the threat surface.
Follow @technadu for neutral, research-driven security reporting.
#CloudSecurity #IAM #Pentesting #Infosec #AttackSurface #TechNadu
-
Active exploitation is being observed via misconfigured security testing applications, enabling attackers to move from exposed training tools into cloud environments.
The issue centers on excessive IAM permissions, default credentials, and poor isolation between test and sensitive systems - not novel malware.
This reinforces the need to treat non-production assets as part of the threat surface.
Follow @technadu for neutral, research-driven security reporting.
#CloudSecurity #IAM #Pentesting #Infosec #AttackSurface #TechNadu
-
Active exploitation is being observed via misconfigured security testing applications, enabling attackers to move from exposed training tools into cloud environments.
The issue centers on excessive IAM permissions, default credentials, and poor isolation between test and sensitive systems - not novel malware.
This reinforces the need to treat non-production assets as part of the threat surface.
Follow @technadu for neutral, research-driven security reporting.
#CloudSecurity #IAM #Pentesting #Infosec #AttackSurface #TechNadu
-
Turning Visibility Into Defense: Connecting the Attack Surface to the Detection Surface: https://jonschipp.substack.com/p/turning-visibility-into-defense-connecting
-
Turning Visibility Into Defense: Connecting the Attack Surface to the Detection Surface: https://jonschipp.substack.com/p/turning-visibility-into-defense-connecting
-
NiamonX Internet Surface (Beta) is now live — a passive, privacy-respecting OSINT & attack-surface intelligence platform built to map real-world exposure at global scale.
Instead of noisy scans or shallow datasets, the platform merges:
• internet-wide scanning (≈3,000 ports)
• multi-source enrichment (WHOIS/RDAP, public registries, partner crawlers)
• deep tech fingerprinting
• graph-based topology mapping
• AI-driven risk reportsThe topology graph reveals relationships between IP ranges, domains, ASNs, software stacks, libraries, misconfigurations, and exposed services — not just “open ports”.
Patterns and systemic weaknesses become visible instantly.The built-in AI Auditor produces contextual security reports:
• attack-path analysis
• CVE clustering & prioritization
• business impact breakdown
• actionable remediation roadmap
A process that normally takes days can now be done in hours.The entire system is designed with security & privacy in mind:
• hardened infrastructure
• zero request logging
• no user tracking
• only quota counters for rate enforcementAvailable across all plans — including the free tier.
If you’re doing OSINT, threat hunting, red/blue team work, or asset discovery, this is a tool worth exploring.
🔗 dash.niamonx.io/internet_surface
🔗 is.niamonx.io#OSINT #ThreatIntel #Infosec #AttackSurface #SecurityTools #CyberSecurity #Recon #AI #PassiveRecon #NiamonX
-
NiamonX Internet Surface (Beta) is now live — a passive, privacy-respecting OSINT & attack-surface intelligence platform built to map real-world exposure at global scale.
Instead of noisy scans or shallow datasets, the platform merges:
• internet-wide scanning (≈3,000 ports)
• multi-source enrichment (WHOIS/RDAP, public registries, partner crawlers)
• deep tech fingerprinting
• graph-based topology mapping
• AI-driven risk reportsThe topology graph reveals relationships between IP ranges, domains, ASNs, software stacks, libraries, misconfigurations, and exposed services — not just “open ports”.
Patterns and systemic weaknesses become visible instantly.The built-in AI Auditor produces contextual security reports:
• attack-path analysis
• CVE clustering & prioritization
• business impact breakdown
• actionable remediation roadmap
A process that normally takes days can now be done in hours.The entire system is designed with security & privacy in mind:
• hardened infrastructure
• zero request logging
• no user tracking
• only quota counters for rate enforcementAvailable across all plans — including the free tier.
If you’re doing OSINT, threat hunting, red/blue team work, or asset discovery, this is a tool worth exploring.
🔗 dash.niamonx.io/internet_surface
🔗 is.niamonx.io#OSINT #ThreatIntel #Infosec #AttackSurface #SecurityTools #CyberSecurity #Recon #AI #PassiveRecon #NiamonX
-
Brash - architectural Blink flaw that enables Chromium collapse; defensive checklist
The Brash research highlights a core Blink design gap: unthrottled document.title updates can saturate the main thread. Impact spans desktop browsers, embedded Chromium runtimes and headless agents. Vendors are expected to patch; until then, defenders should:
• Inventory Chromium runtimes and headless agents.
• Add process-level CPU/latency alerts for browser processes.
• Monitor automation pipelines for simultaneous headless failures.
• Implement circuit breakers for critical UIs and fallbacks for automation.
• Harden email/portal gating to reduce timed-trigger links reaching many users simultaneously.Share detection tactics you’ve tested. Follow @technadu for deeper coverage and technical playbooks.
#Infosec #ThreatIntel #Chromium #BrowserSecurity #EDR #Headless #AttackSurface
-
Brash - architectural Blink flaw that enables Chromium collapse; defensive checklist
The Brash research highlights a core Blink design gap: unthrottled document.title updates can saturate the main thread. Impact spans desktop browsers, embedded Chromium runtimes and headless agents. Vendors are expected to patch; until then, defenders should:
• Inventory Chromium runtimes and headless agents.
• Add process-level CPU/latency alerts for browser processes.
• Monitor automation pipelines for simultaneous headless failures.
• Implement circuit breakers for critical UIs and fallbacks for automation.
• Harden email/portal gating to reduce timed-trigger links reaching many users simultaneously.Share detection tactics you’ve tested. Follow @technadu for deeper coverage and technical playbooks.
#Infosec #ThreatIntel #Chromium #BrowserSecurity #EDR #Headless #AttackSurface
-
Brash - architectural Blink flaw that enables Chromium collapse; defensive checklist
The Brash research highlights a core Blink design gap: unthrottled document.title updates can saturate the main thread. Impact spans desktop browsers, embedded Chromium runtimes and headless agents. Vendors are expected to patch; until then, defenders should:
• Inventory Chromium runtimes and headless agents.
• Add process-level CPU/latency alerts for browser processes.
• Monitor automation pipelines for simultaneous headless failures.
• Implement circuit breakers for critical UIs and fallbacks for automation.
• Harden email/portal gating to reduce timed-trigger links reaching many users simultaneously.Share detection tactics you’ve tested. Follow @technadu for deeper coverage and technical playbooks.
#Infosec #ThreatIntel #Chromium #BrowserSecurity #EDR #Headless #AttackSurface
-
Your digital perimeter isn’t what it used to be. ReversingLabs lays out 10 must-do moves to defang your attack surface before it bites back. https://jpmellojr.blogspot.com/2025/10/the-attack-surface-is-expanding-10-ways.html #AttackSurface #RiskManagement #ASM - #SecurityStrategy #AppSec
-
„One day my son,
all this #AttackSurface
will be yours!“ -
„One day my son,
all this #AttackSurface
will be yours!“ -
„One day my son,
all this #AttackSurface
will be yours!“ -
„One day my son,
all this #AttackSurface
will be yours!“ -
„One day my son,
all this #AttackSurface
will be yours!“ -
Chapter No.312 in the "AI is useless piece of shit with no use cases"
Prompt:
"I want you to add all the attack vectors, patterns and algorithms for NginX, Wordpress, Cadvisor... etc... Can you pull them from the web for me? I want a swiss army knife nginx error log parser"Output:
<Creates a log parser bash script ready to feed prometheus telemetry for Grafana monitoring> ...Is it perfect?
Fsck no.
Is it good enough for my #selfhosted #attacksurface telementry?
Fsck Yes. -
Chapter No.312 in the "AI is useless piece of shit with no use cases"
Prompt:
"I want you to add all the attack vectors, patterns and algorithms for NginX, Wordpress, Cadvisor... etc... Can you pull them from the web for me? I want a swiss army knife nginx error log parser"Output:
<Creates a log parser bash script ready to feed prometheus telemetry for Grafana monitoring> ...Is it perfect?
Fsck no.
Is it good enough for my #selfhosted #attacksurface telementry?
Fsck Yes. -
Chapter No.312 in the "AI is useless piece of shit with no use cases"
Prompt:
"I want you to add all the attack vectors, patterns and algorithms for NginX, Wordpress, Cadvisor... etc... Can you pull them from the web for me? I want a swiss army knife nginx error log parser"Output:
<Creates a log parser bash script ready to feed prometheus telemetry for Grafana monitoring> ...Is it perfect?
Fsck no.
Is it good enough for my #selfhosted #attacksurface telementry?
Fsck Yes. -
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏
The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management
Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.
HD Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.
Key insights from our conversation:
• When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had
• The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days
• Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls
• Traditional agent-based tools can't see what attackers see
#RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.
📺 Watch the video: https://youtu.be/hkKJsKUugIU
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story-bM0PrkAw 📖 Read the blog: https://www.itspmagazine.com/their-stories/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story
➤ Learn more about RunZero: https://itspm.ag/runzero-5733
✦ Catch more stories from RunZero: https://www.itspmagazine.com/directory/runzero
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏
The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management
Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.
HD Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.
Key insights from our conversation:
• When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had
• The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days
• Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls
• Traditional agent-based tools can't see what attackers see
#RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.
📺 Watch the video: https://youtu.be/hkKJsKUugIU
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story-bM0PrkAw 📖 Read the blog: https://www.itspmagazine.com/their-stories/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story
➤ Learn more about RunZero: https://itspm.ag/runzero-5733
✦ Catch more stories from RunZero: https://www.itspmagazine.com/directory/runzero
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏
The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management
Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.
HD Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.
Key insights from our conversation:
• When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had
• The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days
• Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls
• Traditional agent-based tools can't see what attackers see
#RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.
📺 Watch the video: https://youtu.be/hkKJsKUugIU
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story-bM0PrkAw 📖 Read the blog: https://www.itspmagazine.com/their-stories/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story
➤ Learn more about RunZero: https://itspm.ag/runzero-5733
✦ Catch more stories from RunZero: https://www.itspmagazine.com/directory/runzero
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏
The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management
Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.
HD Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.
Key insights from our conversation:
• When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had
• The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days
• Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls
• Traditional agent-based tools can't see what attackers see
#RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.
📺 Watch the video: https://youtu.be/hkKJsKUugIU
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story-bM0PrkAw 📖 Read the blog: https://www.itspmagazine.com/their-stories/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story
➤ Learn more about RunZero: https://itspm.ag/runzero-5733
✦ Catch more stories from RunZero: https://www.itspmagazine.com/directory/runzero
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏
The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management
Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.
HD Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.
Key insights from our conversation:
• When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had
• The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days
• Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls
• Traditional agent-based tools can't see what attackers see
#RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.
📺 Watch the video: https://youtu.be/hkKJsKUugIU
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story-bM0PrkAw 📖 Read the blog: https://www.itspmagazine.com/their-stories/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story
➤ Learn more about RunZero: https://itspm.ag/runzero-5733
✦ Catch more stories from RunZero: https://www.itspmagazine.com/directory/runzero
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity