home.social

#attacksurface — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #attacksurface, aggregated by home.social.

  1. Advanced Subdomain Discovery with Amass and Cheat Sheet

    In this cheat sheet, I cover essential Amass commands, enumeration techniques, and practical workflows for effective recon.
    denizhalil.com/2026/05/02/owas

    #CyberSecurity #OWASP #Amass #SubdomainEnumeration #Recon #OSINT #AttackSurface #BugBounty

  2. Advanced Subdomain Discovery with Amass and Cheat Sheet

    In this cheat sheet, I cover essential Amass commands, enumeration techniques, and practical workflows for effective recon.
    denizhalil.com/2026/05/02/owas

    #CyberSecurity #OWASP #Amass #SubdomainEnumeration #Recon #OSINT #AttackSurface #BugBounty

  3. Advanced Subdomain Discovery with Amass and Cheat Sheet

    In this cheat sheet, I cover essential Amass commands, enumeration techniques, and practical workflows for effective recon.
    denizhalil.com/2026/05/02/owas

    #CyberSecurity #OWASP #Amass #SubdomainEnumeration #Recon #OSINT #AttackSurface #BugBounty

  4. Subdomain Takeover Vulnerabilities and Prevention

    In this article, I cover:
    * How subdomain takeover vulnerabilities occur
    * Real-world exploitation scenarios
    Reconnaissance and detection techniques
    * Practical prevention and DNS hygiene strategies

    denizhalil.com/2026/02/16/subd

    #CyberSecurity #SubdomainTakeover #DNS #AttackSurface #BugBounty #RedTeam #BlueTeam #InfoSec #CloudSecurity #WebSecurity #EthicalHacking

  5. Subdomain Takeover Vulnerabilities and Prevention

    In this article, I cover:
    * How subdomain takeover vulnerabilities occur
    * Real-world exploitation scenarios
    Reconnaissance and detection techniques
    * Practical prevention and DNS hygiene strategies

    denizhalil.com/2026/02/16/subd

    #CyberSecurity #SubdomainTakeover #DNS #AttackSurface #BugBounty #RedTeam #BlueTeam #InfoSec #CloudSecurity #WebSecurity #EthicalHacking

  6. Subdomain Takeover Vulnerabilities and Prevention

    In this article, I cover:
    * How subdomain takeover vulnerabilities occur
    * Real-world exploitation scenarios
    Reconnaissance and detection techniques
    * Practical prevention and DNS hygiene strategies

    denizhalil.com/2026/02/16/subd

    #CyberSecurity #SubdomainTakeover #DNS #AttackSurface #BugBounty #RedTeam #BlueTeam #InfoSec #CloudSecurity #WebSecurity #EthicalHacking

  7. 🔐 Identity compromise and reconnaissance are precursors to deeper breaches and targeted operations. Understanding this shift informs threat modeling and operational OPSEC. The latest index data only just published and signals a shift in attacker prioritization not yet widely reported.

    industrialcyber.co/reports/ibm #AttackSurface

  8. 🔐 Identity compromise and reconnaissance are precursors to deeper breaches and targeted operations. Understanding this shift informs threat modeling and operational OPSEC. The latest index data only just published and signals a shift in attacker prioritization not yet widely reported.

    industrialcyber.co/reports/ibm #AttackSurface

  9. 🔐 Identity compromise and reconnaissance are precursors to deeper breaches and targeted operations. Understanding this shift informs threat modeling and operational OPSEC. The latest index data only just published and signals a shift in attacker prioritization not yet widely reported.

    industrialcyber.co/reports/ibm #AttackSurface

  10. Security Advisory Summary:
    SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
    • CVE-2025-40538 – Broken access control → system admin creation + root RCE
    • Two type confusion flaws → root code execution
    • One IDOR vulnerability → elevated execution

    Attack prerequisites:
    High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

    Exposure landscape:
    12K+ internet-facing instances observed (Shodan)
    File transfer platforms remain ransomware-favored entry vectors

    Historical context:
    Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

    Immediate actions:
    - Patch to 15.5.4
    - Audit privileged accounts
    - Review FTP/SFTP exposure
    - Monitor for anomalous admin creation

    Source: bleepingcomputer.com/news/secu

    Follow us for tactical advisories and vulnerability intelligence.

    Comment with your detection or hardening recommendations.

    #Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust

  11. Security Advisory Summary:
    SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
    • CVE-2025-40538 – Broken access control → system admin creation + root RCE
    • Two type confusion flaws → root code execution
    • One IDOR vulnerability → elevated execution

    Attack prerequisites:
    High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

    Exposure landscape:
    12K+ internet-facing instances observed (Shodan)
    File transfer platforms remain ransomware-favored entry vectors

    Historical context:
    Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

    Immediate actions:
    - Patch to 15.5.4
    - Audit privileged accounts
    - Review FTP/SFTP exposure
    - Monitor for anomalous admin creation

    Source: bleepingcomputer.com/news/secu

    Follow us for tactical advisories and vulnerability intelligence.

    Comment with your detection or hardening recommendations.

    #Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust

  12. Security Advisory Summary:
    SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
    • CVE-2025-40538 – Broken access control → system admin creation + root RCE
    • Two type confusion flaws → root code execution
    • One IDOR vulnerability → elevated execution

    Attack prerequisites:
    High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

    Exposure landscape:
    12K+ internet-facing instances observed (Shodan)
    File transfer platforms remain ransomware-favored entry vectors

    Historical context:
    Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

    Immediate actions:
    - Patch to 15.5.4
    - Audit privileged accounts
    - Review FTP/SFTP exposure
    - Monitor for anomalous admin creation

    Source: bleepingcomputer.com/news/secu

    Follow us for tactical advisories and vulnerability intelligence.

    Comment with your detection or hardening recommendations.

    #Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust

  13. Security Advisory Summary:
    SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
    • CVE-2025-40538 – Broken access control → system admin creation + root RCE
    • Two type confusion flaws → root code execution
    • One IDOR vulnerability → elevated execution

    Attack prerequisites:
    High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

    Exposure landscape:
    12K+ internet-facing instances observed (Shodan)
    File transfer platforms remain ransomware-favored entry vectors

    Historical context:
    Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

    Immediate actions:
    - Patch to 15.5.4
    - Audit privileged accounts
    - Review FTP/SFTP exposure
    - Monitor for anomalous admin creation

    Source: bleepingcomputer.com/news/secu

    Follow us for tactical advisories and vulnerability intelligence.

    Comment with your detection or hardening recommendations.

    #Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust

  14. Active exploitation is being observed via misconfigured security testing applications, enabling attackers to move from exposed training tools into cloud environments.

    The issue centers on excessive IAM permissions, default credentials, and poor isolation between test and sensitive systems - not novel malware.

    This reinforces the need to treat non-production assets as part of the threat surface.

    Source: bleepingcomputer.com/news/secu

    Follow @technadu for neutral, research-driven security reporting.

    #CloudSecurity #IAM #Pentesting #Infosec #AttackSurface #TechNadu

  15. Active exploitation is being observed via misconfigured security testing applications, enabling attackers to move from exposed training tools into cloud environments.

    The issue centers on excessive IAM permissions, default credentials, and poor isolation between test and sensitive systems - not novel malware.

    This reinforces the need to treat non-production assets as part of the threat surface.

    Source: bleepingcomputer.com/news/secu

    Follow @technadu for neutral, research-driven security reporting.

    #CloudSecurity #IAM #Pentesting #Infosec #AttackSurface #TechNadu

  16. Active exploitation is being observed via misconfigured security testing applications, enabling attackers to move from exposed training tools into cloud environments.

    The issue centers on excessive IAM permissions, default credentials, and poor isolation between test and sensitive systems - not novel malware.

    This reinforces the need to treat non-production assets as part of the threat surface.

    Source: bleepingcomputer.com/news/secu

    Follow @technadu for neutral, research-driven security reporting.

    #CloudSecurity #IAM #Pentesting #Infosec #AttackSurface #TechNadu

  17. Active exploitation is being observed via misconfigured security testing applications, enabling attackers to move from exposed training tools into cloud environments.

    The issue centers on excessive IAM permissions, default credentials, and poor isolation between test and sensitive systems - not novel malware.

    This reinforces the need to treat non-production assets as part of the threat surface.

    Source: bleepingcomputer.com/news/secu

    Follow @technadu for neutral, research-driven security reporting.

    #CloudSecurity #IAM #Pentesting #Infosec #AttackSurface #TechNadu

  18. NiamonX Internet Surface (Beta) is now live — a passive, privacy-respecting OSINT & attack-surface intelligence platform built to map real-world exposure at global scale.

    Instead of noisy scans or shallow datasets, the platform merges:
    • internet-wide scanning (≈3,000 ports)
    • multi-source enrichment (WHOIS/RDAP, public registries, partner crawlers)
    • deep tech fingerprinting
    • graph-based topology mapping
    • AI-driven risk reports

    The topology graph reveals relationships between IP ranges, domains, ASNs, software stacks, libraries, misconfigurations, and exposed services — not just “open ports”.
    Patterns and systemic weaknesses become visible instantly.

    The built-in AI Auditor produces contextual security reports:
    • attack-path analysis
    • CVE clustering & prioritization
    • business impact breakdown
    • actionable remediation roadmap
    A process that normally takes days can now be done in hours.

    The entire system is designed with security & privacy in mind:
    • hardened infrastructure
    • zero request logging
    • no user tracking
    • only quota counters for rate enforcement

    Available across all plans — including the free tier.

    If you’re doing OSINT, threat hunting, red/blue team work, or asset discovery, this is a tool worth exploring.

    🔗 dash.niamonx.io/internet_surface
    🔗 is.niamonx.io

    #OSINT #ThreatIntel #Infosec #AttackSurface #SecurityTools #CyberSecurity #Recon #AI #PassiveRecon #NiamonX

  19. NiamonX Internet Surface (Beta) is now live — a passive, privacy-respecting OSINT & attack-surface intelligence platform built to map real-world exposure at global scale.

    Instead of noisy scans or shallow datasets, the platform merges:
    • internet-wide scanning (≈3,000 ports)
    • multi-source enrichment (WHOIS/RDAP, public registries, partner crawlers)
    • deep tech fingerprinting
    • graph-based topology mapping
    • AI-driven risk reports

    The topology graph reveals relationships between IP ranges, domains, ASNs, software stacks, libraries, misconfigurations, and exposed services — not just “open ports”.
    Patterns and systemic weaknesses become visible instantly.

    The built-in AI Auditor produces contextual security reports:
    • attack-path analysis
    • CVE clustering & prioritization
    • business impact breakdown
    • actionable remediation roadmap
    A process that normally takes days can now be done in hours.

    The entire system is designed with security & privacy in mind:
    • hardened infrastructure
    • zero request logging
    • no user tracking
    • only quota counters for rate enforcement

    Available across all plans — including the free tier.

    If you’re doing OSINT, threat hunting, red/blue team work, or asset discovery, this is a tool worth exploring.

    🔗 dash.niamonx.io/internet_surface
    🔗 is.niamonx.io

    #OSINT #ThreatIntel #Infosec #AttackSurface #SecurityTools #CyberSecurity #Recon #AI #PassiveRecon #NiamonX

  20. Brash - architectural Blink flaw that enables Chromium collapse; defensive checklist

    The Brash research highlights a core Blink design gap: unthrottled document.title updates can saturate the main thread. Impact spans desktop browsers, embedded Chromium runtimes and headless agents. Vendors are expected to patch; until then, defenders should:
    • Inventory Chromium runtimes and headless agents.
    • Add process-level CPU/latency alerts for browser processes.
    • Monitor automation pipelines for simultaneous headless failures.
    • Implement circuit breakers for critical UIs and fallbacks for automation.
    • Harden email/portal gating to reduce timed-trigger links reaching many users simultaneously.

    Share detection tactics you’ve tested. Follow @technadu for deeper coverage and technical playbooks.

    #Infosec #ThreatIntel #Chromium #BrowserSecurity #EDR #Headless #AttackSurface

  21. Brash - architectural Blink flaw that enables Chromium collapse; defensive checklist

    The Brash research highlights a core Blink design gap: unthrottled document.title updates can saturate the main thread. Impact spans desktop browsers, embedded Chromium runtimes and headless agents. Vendors are expected to patch; until then, defenders should:
    • Inventory Chromium runtimes and headless agents.
    • Add process-level CPU/latency alerts for browser processes.
    • Monitor automation pipelines for simultaneous headless failures.
    • Implement circuit breakers for critical UIs and fallbacks for automation.
    • Harden email/portal gating to reduce timed-trigger links reaching many users simultaneously.

    Share detection tactics you’ve tested. Follow @technadu for deeper coverage and technical playbooks.

    #Infosec #ThreatIntel #Chromium #BrowserSecurity #EDR #Headless #AttackSurface

  22. Brash - architectural Blink flaw that enables Chromium collapse; defensive checklist

    The Brash research highlights a core Blink design gap: unthrottled document.title updates can saturate the main thread. Impact spans desktop browsers, embedded Chromium runtimes and headless agents. Vendors are expected to patch; until then, defenders should:
    • Inventory Chromium runtimes and headless agents.
    • Add process-level CPU/latency alerts for browser processes.
    • Monitor automation pipelines for simultaneous headless failures.
    • Implement circuit breakers for critical UIs and fallbacks for automation.
    • Harden email/portal gating to reduce timed-trigger links reaching many users simultaneously.

    Share detection tactics you’ve tested. Follow @technadu for deeper coverage and technical playbooks.

    #Infosec #ThreatIntel #Chromium #BrowserSecurity #EDR #Headless #AttackSurface

  23. „One day my son,
    all this #AttackSurface
    will be yours!“

  24. „One day my son,
    all this #AttackSurface
    will be yours!“

  25. „One day my son,
    all this #AttackSurface
    will be yours!“

  26. „One day my son,
    all this #AttackSurface
    will be yours!“

  27. „One day my son,
    all this #AttackSurface
    will be yours!“

  28. Chapter No.312 in the "AI is useless piece of shit with no use cases"

    Prompt:
    "I want you to add all the attack vectors, patterns and algorithms for NginX, Wordpress, Cadvisor... etc... Can you pull them from the web for me? I want a swiss army knife nginx error log parser"

    Output:
    <Creates a log parser bash script ready to feed prometheus telemetry for Grafana monitoring> ...

    Is it perfect?
    Fsck no.
    Is it good enough for my #selfhosted #attacksurface telementry?
    Fsck Yes.

    #OWASP #Vibecoding #Grafana #PromptEngineering #GitGud

  29. Chapter No.312 in the "AI is useless piece of shit with no use cases"

    Prompt:
    "I want you to add all the attack vectors, patterns and algorithms for NginX, Wordpress, Cadvisor... etc... Can you pull them from the web for me? I want a swiss army knife nginx error log parser"

    Output:
    <Creates a log parser bash script ready to feed prometheus telemetry for Grafana monitoring> ...

    Is it perfect?
    Fsck no.
    Is it good enough for my #selfhosted #attacksurface telementry?
    Fsck Yes.

    #OWASP #Vibecoding #Grafana #PromptEngineering #GitGud

  30. Chapter No.312 in the "AI is useless piece of shit with no use cases"

    Prompt:
    "I want you to add all the attack vectors, patterns and algorithms for NginX, Wordpress, Cadvisor... etc... Can you pull them from the web for me? I want a swiss army knife nginx error log parser"

    Output:
    <Creates a log parser bash script ready to feed prometheus telemetry for Grafana monitoring> ...

    Is it perfect?
    Fsck no.
    Is it good enough for my #selfhosted #attacksurface telementry?
    Fsck Yes.

    #OWASP #Vibecoding #Grafana #PromptEngineering #GitGud

  31. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏

    The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management

    Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.

    HD‏​​​​​​​​​​‏ ⁢​​​​Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.

    Key insights from our conversation:

    • When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had

    • The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days

    • Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls

    • Traditional agent-based tools can't see what attackers see

    #RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.

    📺 Watch the video: youtu.be/hkKJsKUugIU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca 📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about RunZero: itspm.ag/runzero-5733

    ✦ Catch more stories from RunZero: itspmagazine.com/directory/run

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity

  32. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏

    The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management

    Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.

    HD‏​​​​​​​​​​‏ ⁢​​​​Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.

    Key insights from our conversation:

    • When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had

    • The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days

    • Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls

    • Traditional agent-based tools can't see what attackers see

    #RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.

    📺 Watch the video: youtu.be/hkKJsKUugIU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca 📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about RunZero: itspm.ag/runzero-5733

    ✦ Catch more stories from RunZero: itspmagazine.com/directory/run

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity

  33. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏

    The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management

    Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.

    HD‏​​​​​​​​​​‏ ⁢​​​​Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.

    Key insights from our conversation:

    • When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had

    • The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days

    • Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls

    • Traditional agent-based tools can't see what attackers see

    #RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.

    📺 Watch the video: youtu.be/hkKJsKUugIU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca 📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about RunZero: itspm.ag/runzero-5733

    ✦ Catch more stories from RunZero: itspmagazine.com/directory/run

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity

  34. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏

    The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management

    Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.

    HD‏​​​​​​​​​​‏ ⁢​​​​Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.

    Key insights from our conversation:

    • When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had

    • The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days

    • Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls

    • Traditional agent-based tools can't see what attackers see

    #RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.

    📺 Watch the video: youtu.be/hkKJsKUugIU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca 📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about RunZero: itspm.ag/runzero-5733

    ✦ Catch more stories from RunZero: itspmagazine.com/directory/run

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity

  35. 🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!

    We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

    🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

    We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏

    The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management

    Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.

    HD‏​​​​​​​​​​‏ ⁢​​​​Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.

    Key insights from our conversation:

    • When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had

    • The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days

    • Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls

    • Traditional agent-based tools can't see what attackers see

    #RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.

    📺 Watch the video: youtu.be/hkKJsKUugIU

    🎧 Listen to the podcast: brand-stories-podcast.simpleca 📖 Read the blog: itspmagazine.com/their-stories

    ➤ Learn more about RunZero: itspm.ag/runzero-5733

    ✦ Catch more stories from RunZero: itspmagazine.com/directory/run

    🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

    #Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity