0
Skip to Content
ThreatNG Security
ThreatNG Security
Product
Overview
Discover and Inventory
Assess, Examine, and Rate
Continuous Visibility and Monitoring
Report and Share
Collaborate and Manage
Solutions
External Attack Surface Management
Cloud and SaaS Exposure Management
Third-Party Risk Management
Digital Risk Protection
Security Ratings
Brand Protection
Due Diligence
Resources
Blog
Library
Support
DarcUpdates
Investigation Modules
Intelligence Repositories
ThreatNG Security Platform Training
Research
DarcSight Labs
Open Source Intelligence (OSINT)
Digital Presence Triad (FBI)
Functional Assets & Pillars
Open Source Repository Effort
About
Story
Contact
DARC Playlist
Two Way Tuesdays
Evaluate
ThreatNG Security
ThreatNG Security
Product
Overview
Discover and Inventory
Assess, Examine, and Rate
Continuous Visibility and Monitoring
Report and Share
Collaborate and Manage
Solutions
External Attack Surface Management
Cloud and SaaS Exposure Management
Third-Party Risk Management
Digital Risk Protection
Security Ratings
Brand Protection
Due Diligence
Resources
Blog
Library
Support
DarcUpdates
Investigation Modules
Intelligence Repositories
ThreatNG Security Platform Training
Research
DarcSight Labs
Open Source Intelligence (OSINT)
Digital Presence Triad (FBI)
Functional Assets & Pillars
Open Source Repository Effort
About
Story
Contact
DARC Playlist
Two Way Tuesdays
Evaluate
Folder: Product
Back
Overview
Discover and Inventory
Assess, Examine, and Rate
Continuous Visibility and Monitoring
Report and Share
Collaborate and Manage
Folder: Solutions
Back
External Attack Surface Management
Cloud and SaaS Exposure Management
Third-Party Risk Management
Digital Risk Protection
Security Ratings
Brand Protection
Due Diligence
Folder: Resources
Back
Blog
Library
Support
DarcUpdates
Investigation Modules
Intelligence Repositories
ThreatNG Security Platform Training
Folder: Research
Back
DarcSight Labs
Open Source Intelligence (OSINT)
Digital Presence Triad (FBI)
Functional Assets & Pillars
Open Source Repository Effort
Folder: About
Back
Story
Contact
DARC Playlist
Two Way Tuesdays
Evaluate

 

Revolutionizing Penetration Testing Efficiency with ThreatNG's Security Ratings
Attack Surface, Attack Surface Management, Attack Surface Map, Technical Attack Surface, Digital Presence Threat Management, Digital Reconnaissance, Digital Risk Protection, Active Recon, Open Source Intelligence Rakshina Padhiar 3/25/25 Attack Surface, Attack Surface Management, Attack Surface Map, Technical Attack Surface, Digital Presence Threat Management, Digital Reconnaissance, Digital Risk Protection, Active Recon, Open Source Intelligence Rakshina Padhiar 3/25/25

Revolutionizing Penetration Testing Efficiency with ThreatNG's Security Ratings

Read More
DarCache: ThreatNG's Intelligent Guard Against Cyber Risk
Attack Surface, Attack Surface Management, Attack Surface Map, Business Attack Surface, External Attack Surface, External Attack Surface Management, Technical Attack Surface, Intelligence Repositories, Open Source Intelligence, Ransomware Intelligence Repository, External Exposure Management, Continuous Threat Exposure Management, EASM, DRP, Digital Presence Threat Management, Digital Risk Protection, Cybersecurity Ratings, Cybersecurity Risk Rating, Security Ratings Rakshina Padhiar 1/14/25 Attack Surface, Attack Surface Management, Attack Surface Map, Business Attack Surface, External Attack Surface, External Attack Surface Management, Technical Attack Surface, Intelligence Repositories, Open Source Intelligence, Ransomware Intelligence Repository, External Exposure Management, Continuous Threat Exposure Management, EASM, DRP, Digital Presence Threat Management, Digital Risk Protection, Cybersecurity Ratings, Cybersecurity Risk Rating, Security Ratings Rakshina Padhiar 1/14/25

DarCache: ThreatNG's Intelligent Guard Against Cyber Risk

Read More
How ThreatNG Intelligence Repositories Address the Diverse Needs of the Event Technology Industry
Attack Surface, Attack Surface Management, External Attack Surface Management, EASM, ASM, Security Ratings, Cybersecurity Ratings, Brand Threat Intelligence, Critical Event Intelligence, Open Source Intelligence, Intelligence Repositories Erin Price 11/6/23 Attack Surface, Attack Surface Management, External Attack Surface Management, EASM, ASM, Security Ratings, Cybersecurity Ratings, Brand Threat Intelligence, Critical Event Intelligence, Open Source Intelligence, Intelligence Repositories Erin Price 11/6/23

How ThreatNG Intelligence Repositories Address the Diverse Needs of the Event Technology Industry

Read More
The Overlooked Areas of Investigation: Exposed Code Repositories, Paste Sites, and Web Archives
Digital Presence Threat Management, Digital Reconnaissance, Digital Risk Protection, External Attack Surface Management, Attack Surface Management, Technical Attack Surface, Attack Surface, Attack Surface Map, Business Attack Surface, Open Source Intelligence Erin Price 8/10/23 Digital Presence Threat Management, Digital Reconnaissance, Digital Risk Protection, External Attack Surface Management, Attack Surface Management, Technical Attack Surface, Attack Surface, Attack Surface Map, Business Attack Surface, Open Source Intelligence Erin Price 8/10/23

The Overlooked Areas of Investigation: Exposed Code Repositories, Paste Sites, and Web Archives

Read More
OSINT Top Ten: Number 1 -  Domain Information
OSINT, Top Ten List, Open Source Intelligence Threat NG Staff 4/28/21 OSINT, Top Ten List, Open Source Intelligence Threat NG Staff 4/28/21

OSINT Top Ten: Number 1 - Domain Information

Coming in at number one of our OSINT Top Ten is Domain Information which includes all Domains, Subdomains, Certificates, Emails, and Permutations/Look-Alikes (Company Names, Domains, and Emails).

Read More
OSINT Top Ten: Number 2 - Social Media
OSINT, Top Ten List, Open Source Intelligence Threat NG Staff 3/29/21 OSINT, Top Ten List, Open Source Intelligence Threat NG Staff 3/29/21

OSINT Top Ten: Number 2 - Social Media

It is essential to monitor what is broadcasted on social media for compliant branding, instances of malicious/negative sentiment, and for the appropriate level of information sharing.

Read More
OSINT Top Ten: Number 3 - Sensitive Code Exposure
OSINT, Top Ten List, Open Source Intelligence Threat NG Staff 3/21/21 OSINT, Top Ten List, Open Source Intelligence Threat NG Staff 3/21/21

OSINT Top Ten: Number 3 - Sensitive Code Exposure

Online code repositories such as GitHub have grown to become standard solutions for version control and source code management. These solutions have proven to be easy-to-use but also prone to misconfigurations leading to the exposure of sensitive information (specifically sensitive code).

Read More
OSINT Top Ten: Number 4 -  Search Engine Exploitation
Open Source Intelligence, OSINT, Top Ten List Threat NG Staff 3/4/21 Open Source Intelligence, OSINT, Top Ten List Threat NG Staff 3/4/21

OSINT Top Ten: Number 4 - Search Engine Exploitation

Today we'll be talking about robots and dorks because at Number Four of the Open Source Intelligence Top Ten (aka OSINT Top Ten) is Search Engine Exploitation.

Read More
OSINT Top Ten: Number 5 - Cloud Exposure
OSINT, Open Source Intelligence, Top Ten List Threat NG Staff 3/4/21 OSINT, Open Source Intelligence, Top Ten List Threat NG Staff 3/4/21

OSINT Top Ten: Number 5 - Cloud Exposure

It is important to examine “The Cloud” (especially vendor offerings like Amazon AWS, Google Cloud Platform, and Microsoft Azure) for anything that can be linked directly to your organization, brand, and offerings: key individuals, locations, domains, products, services, and project names.

Read More
OSINT Top Ten: Number 6 - Online Text Sharing Repositories
Open Source Intelligence, OSINT, Top Ten List Threat NG Staff 2/28/21 Open Source Intelligence, OSINT, Top Ten List Threat NG Staff 2/28/21

OSINT Top Ten: Number 6 - Online Text Sharing Repositories

More commonly known as "paste sites," these online sharing repositories make it easy to share text from anywhere to anyone.

Read More
OSINT Top Ten: Number 7 - Sentiment and Financials
Open Source Intelligence, OSINT, Top Ten List Threat NG Staff 2/23/21 Open Source Intelligence, OSINT, Top Ten List Threat NG Staff 2/23/21

OSINT Top Ten: Number 7 - Sentiment and Financials

Monitoring and managing how your organization is presented online and perceived in public digital spaces is an integral part of threat management.

Read More
OSINT Top Ten: Number 8 - Archived Web Pages
OSINT, Open Source Intelligence, Top Ten List Threat NG Staff 2/16/21 OSINT, Open Source Intelligence, Top Ten List Threat NG Staff 2/16/21

OSINT Top Ten: Number 8 - Archived Web Pages

Mismanagement or turning a blind eye to this vital part of an organization's digital presence can lead to brand damage, data leaks, or even possible persistent/ongoing attacks against existing live assets.

Read More
OSINT Top Ten: Number 9 -  Dark Web
OSINT, Open Source Intelligence, Top Ten List Threat NG Staff 2/14/21 OSINT, Open Source Intelligence, Top Ten List Threat NG Staff 2/14/21

OSINT Top Ten: Number 9 - Dark Web

Is it true that one can only find dark Elves on the dark web? False, the dark elves we've seen are only in the Marvel Cinematic Universe. But there is information on the dark web that does not exist anywhere else.

Read More
OSINT Top Ten: Number 10 -  Technology Stack
OSINT, Open Source Intelligence, Top Ten List Threat NG Staff 2/12/21 OSINT, Open Source Intelligence, Top Ten List Threat NG Staff 2/12/21

OSINT Top Ten: Number 10 - Technology Stack

Your technology stack can give away more than you would think. From this alone, anyone can gain knowledge and insight into the inner workings of your organization.

Read More

ThreatNG
info@threatngsecurity.com

Product Solutions Resources Research About

 Copyright 2025 ThreatNG Security. All Rights Reserved.