March 12, 2026
Stop Guessing, Start Proving: Eradicating External Blind Spots Across Identity, Supply Chain, and Shadow AI
As the modern enterprise expands far beyond the traditional perimeter, security teams are facing a growing visibility crisis. The rapid adoption of remote work, dynamic software supply chains, and generative AI has created massive blind spots where internal tools simply cannot reach. You cannot secure what you cannot see. Today, ThreatNG is proud to announce a major platform update that bridges this dangerous gap. By delivering unauthenticated, outside-in discovery across your identity infrastructure, software supply chain, and AI deployments, we are giving you the Contextual Certainty needed to move from operational anxiety to Strategic Calm. This release dismantles the "Shadow Enterprise," empowering you to proactively neutralize threats before adversaries exploit them.
DarCache Infostealer: The Antidote to MFA Obsolescence
The rapid acceleration of remote work has pushed your network perimeter directly into your employees' living rooms. In this environment, your massive ROI in identity infrastructure, including Multi-Factor Authentication (MFA), effectively expires the moment a session token is stolen.
Today, Initial Access Brokers (IABs) use highly evasive Information Stealer (infostealer) malware to silently harvest active session cookies and Primary Refresh Tokens (PRTs) directly from the unmanaged personal devices (BYOD) of your employees. Because these stolen session tokens act as a modern "Golden Ticket," attackers can completely bypass your MFA prompts and seamlessly hijack active cloud sessions without ever triggering an internal alarm.
You cannot protect what your internal tools are blind to. Our new Infostealer Intelligence Repository (DarCache Infostealer) provides definitive "Outside-In Identity Protection." By continuously parsing, normalizing, and sanitizing dark web marketplaces and Telegram log clouds, DarCache Infostealer provides the unauthenticated external visibility needed to detect and neutralize compromised digital identities before ransomware syndicates weaponize them.
How DarCache Infostealer Transforms Your Defense:
Prevent MFA Obsolescence & Regain Control: Internal tools only protect what they have permission to see. DarCache restores your control by automating the discovery of compromised PRTs actively traded on the dark web, giving you the actionable truth needed to immediately invalidate active cloud sessions, isolate infected devices, and force global password resets.
Achieve Boardroom Authority with Legal-Grade Attribution: Relying on generic Threat Intelligence feeds is like watching the weather channel; it tells you a storm is coming, but not if your specific window is open. We move beyond flat lists of stolen passwords to deliver Legal-Grade Attribution, proving beyond a doubt that a compromised session token belongs to your organization.
Eradicate the "Hidden Tax on the SOC": Using DarChain (External Contextual Attack Path Intelligence), we transform chaotic dark web infostealer logs into a precise architectural Blueprint. By correlating a specific stolen credential with an exposed API, we empower your analysts to execute surgical remediations rather than drowning in dashboard noise.
xSBOM: The End of the "Blind Trust" Supply Chain
Just as identity has expanded beyond your internal control, so has your software stack. For years, security leaders have chased the elusive SBOM (Software Bill of Materials) by relying on static vendor questionnaires and internal guesswork. By the time the spreadsheet is updated, the environment has already changed.
The dangerous delta between what your procurement department thinks you use and what is actually exposed to the internet is exactly where the adversary lives. ThreatNG is closing that gap with our new xSBOM (External SBOM) reporting capability.
We are taking the concept of the SBOM out of the theoretical, document-centric world and pulling it into the reality of the External Adversary View. Using our signature unauthenticated, outside-in discovery, ThreatNG now automatically generates a dynamic, real-time inventory of the third-party software, open-source libraries, APIs, and SaaS dependencies that make up your true external attack surface.
Why xSBOM Changes the Game:
The "Trust But Verify" Engine: Internal SBOMs tell you what should be deployed. xSBOM tells you what is exposed. We uncover the Shadow Supply Chain—unapproved chat widgets, forgotten JavaScript libraries, and unauthorized SaaS tools—that your internal scanners simply cannot see.
Zero-Friction Visibility: No agents, no code integration, and no "Connector Tax." We build your xSBOM purely from the outside, mapping the N-th party connections that expand your risk perimeter.
Contextual Certainty for Supply Chain Risk: When the next Log4j or high-profile zero-day hits, you no longer have to endure a multi-day fire drill. Your xSBOM provides immediate, Legal-Grade Attribution to answer the Board with unshakeable confidence.
Subdomain Infrastructure Exposure: Unmasking Shadow AI
Beyond traditional SaaS, the rapid adoption of Artificial Intelligence has created a new, critical blind spot for security leaders: Shadow AI. As developers and business units race to integrate GenAI and Large Language Models (LLMs) into their workflows, they frequently spin up AI frameworks, orchestration tools, and vector databases outside the purview of official IT and security governance.
This sprawling, unmanaged infrastructure creates a massive "Compliance Gap" and drastically increases your Data Leak Susceptibility.
To combat this, we have significantly expanded our External AI Discovery and Assessment capabilities. Our enhanced Subdomain Infrastructure Exposure module now automatically uncovers and identifies a comprehensive suite of modern AI vendors and technologies running on your external perimeter.
Newly Supported AI Technologies & Vendors Include:
Vector Databases & Storage: Pinecone, Milvus, QDrant, DuckDB
LLM Orchestration & Tooling: Langflow, Ollama, LiteLLM, LM Studio, AnythingLLM
Context Protocol (MCP) Infrastructure: Enterprise MCP, General SSE MCP, MCP Inspector, Next.js MCP, Playwrite MCP
Automation & Integration: n8n, HighByte, Clawdbot (Moltbot)
When a developer stands up an unauthenticated Ollama instance or leaves a Langflow dashboard exposed on a forgotten subdomain, traditional internal scanners miss it. This enhancement allows you to track down asset owners, enforce security policies, and proactively dismantle risky attack paths using definitive evidence.
Stop Hoping Your Perimeter is Secure. Start Proving It.
You cannot manage external risk with static lists and blind trust. You need continuous, objective proof of your external reality.
👉 Existing Users: Your Reconnaissance Hub just leveled up. Log in now to access the DarCache Infostealer repository, generate your first xSBOM report, and review your Subdomain Infrastructure Exposure to see the unvarnished truth of your digital footprint.
👉 New Users: Stop letting Initial Access Brokers and Shadow IT dictate your risk posture. Contact us today for a free evaluation and experience the power of Contextual Certainty for yourself.

