-
https://www.hackerone.com/product/attack-surface-management
-
We're already very careful about this...
Rather than give the API server cluster-scoped r/w on Secrets, we have given that permission to the management controller instead. As Projects are created/d…
-
[•] CVE-2021-44228 - Apache Log4j RCE Scanner
[•] Scanner provided by FullHunt.io - The Next-Gen Attack Surface Management Platform.
[•] Secure your External Attack Surface with FullHunt.io.
[•] In…
-
congratulations for Attack Surface Management
what you have for external ?
-
# 💡 Summary #
https://docs.crossfeed.cyber.dhs.gov/
_At the very least, the last sentence needs to be removed:_
About Crossfeed
Crossfeed is a tool that continuously enumerates and monitors …
-
Hi, i recently found BorgWarehouse and have been liking it so far.
I run BorgWarehouse behind Caddy as my Reverse Proxy and am using Authelia for Central User management and Reducing the Attack Sur…
-
Some screenshots look like they've been shrunk to fit them on the page better, this is great for the context of the tutorial but it would be good to be able to zoom in to read the screenshots to get a…
-
In this:
https://learn.microsoft.com/en-us/azure/external-attack-surface-management/deploying-the-defender-easm-azure-resource#create-resources-in-a-resource-group
The first step asks you to Creat…
-
21. Section 5.4 – Reproducing earlier comment from the list on previous version of this draft: “It is not clear as to what threat is being addressed by requiring flow level granularity. If communi…
-
Hello,
I need to implement some ASR rules on some VMs in our Azure environment. I am not very familiar with powershell so I think this tool could really help me. I'm just not sure how to use it.
I…