Starve the Adversary, Silence the Noise: Take Command of Your Perimeter with ThreatNG's Latest Release

The modern Security Operations Center is constantly forced into a reactive, defensive crouch, paralyzed by noisy alerts and constantly fighting fires instead of preventing them. In the realm of External Attack Surface Management and Digital Risk Protection, passive visibility is a losing strategy. You must take the offensive.

Today, ThreatNG is proud to announce a trio of powerful platform updates designed to shift your defense entirely to the left and starve the adversary of their attack vectors. By delivering proactive brand protection, precision noise reduction, and seamless programmatic orchestration, we give you the Contextual Certainty needed to dictate the terms of engagement and take absolute command of your external perimeter.

Dismantle Phishing Infrastructure with Specialized Domain Permutation Reports

The most devastating cyberattacks bypass your firewalls entirely; they target your customers, employees, and partners using weaponized lookalike domains. By the time a Business Email Compromise (BEC) campaign using a typosquatted domain reaches your secure email gateway, the adversary already has the high ground. You are reacting to their strike.

Today, we are releasing two new specialized reports designed to dismantle phishing infrastructure before a single malicious email is sent: Domain Name Permutations Taken and Domain Name Permutations Available. Generating a list of typosquats is not just administrative; it is a lethal component of proactive Digital Risk Protection.

How These Reports Starve the Adversary:

By automatically enumerating common typos, TLD swaps, and structural permutations of your primary domains, ThreatNG provides a definitive map of your brand’s external vulnerability from the External Adversary View.

  • Domain Name Permutations Taken (The Active Threat Radar): This report identifies exactly which lookalike domains have been actively weaponized. By pinpointing the exact permutations used with active Mail Records (MX) or associated IP addresses, we highlight the staging ground for an imminent phishing or spoofing attack. Your SOC can immediately use this intelligence to update email blocklists and initiate aggressive takedown procedures.

  • Domain Name Permutations Available (The Proactive Shield): This report reveals the exact domains adversaries plan to register tomorrow. Instead of waiting for an attacker to claim a lookalike domain, you can either defensively acquire high-risk permutations or continuously monitor them, effectively starving the adversary of the infrastructure they require.

  • Take Command: By separating the "Taken" (immediate operational threat) from the "Available" (strategic brand vulnerability), you transition from hoping you catch a phishing email to mathematically proving you have closed the adversary's avenues of attack.

Silence the Noise and Eradicate the False Positive Tax with Enhanced Policy Exception Management

Visibility without control is just chaos. You are not suffering from a lack of data; you are drowning in a surplus of noise. When your dashboards are cluttered with accepted risks or irrelevant homoglyph domains, your analysts pay a heavy "False Positive Tax," wasting critical hours triaging benign alerts rather than dismantling true attack paths.

Today, we are thrilled to announce a highly requested enhancement to our Policy Exception Management capabilities. You now have the precision control to suppress specific alert categories, explicitly targeting "Vulnerabilities on Assets" and "Domain Name Permutations."

How Precision Control Upgrades Your SOC:

While the ability to suppress an alert might seem simple, it is a foundational component of achieving Contextual Certainty.

  • Eliminate Alert Fatigue: If you have already investigated a specific homoglyph domain and determined it poses no active threat, or if a vulnerability on a known asset falls within your accepted risk parameters, you should never be forced to clear that alert again. This update allows you to silence them permanently.

  • Target Weaponized Threats: By applying targeted suppression policies, you filter out the operational friction. Your team can train its sights exclusively on the unmanaged, weaponized threats that pose a lethal danger to your enterprise.

  • Dictate the Narrative: This enhancement empowers you to shape the platform's intelligence to align with your exact corporate governance and risk appetite. You dictate what matters, ensuring your leadership and security teams only see the irrefutable truth that requires immediate action.

Automate the Offensive: Unleash DarCache with Enhanced Programmatic API Orchestration

Threat intelligence sitting in an isolated dashboard is not intelligence; it is just more data to manage. To defeat the autonomous adversary, your security stack must operate as a unified, automated weapon system. When a new ransomware group emerges or a zero-day vulnerability drops, your team cannot waste time manually cross-referencing external threat feeds against internal asset inventories.

Today, we are announcing a powerful enhancement to the API and respective documentation for our DarCache Intelligence Repositories. This is not a minor administrative release; it is the key to unlocking total security orchestration and eliminating manual "swivel-chair" analysis.

How API Orchestration Acts as a Force Multiplier:

This update empowers your engineering and SOC teams to seamlessly integrate ThreatNG's definitive "Truth Serum" directly into your existing SIEM, SOAR, or custom complementary platforms.

  • Programmatic Discovery (Ingesting the Truth): Your systems can now continuously poll our enhanced Feed APIs to instantly ingest verified, external intelligence. Whether pulling real-time data on weaponized vulnerabilities (/feed/EPSS/, /feed/KEV/), tracking dark web credential leaks (/feed/CompromisedCredentials/), or monitoring regulatory risk, your internal tools are now fueled by definitive outside-in intelligence.

  • Programmatic Validation & Orchestration: Stop treating intelligence as a static list. The enhanced API structure allows your complementary solutions to automatically weave these capabilities together. If your internal scanner flags a vulnerability, your SOAR can automatically query the DarCache API to validate if that specific flaw has a verified Proof-of-Concept or is actively being used by ransomware syndicates, instantly prioritizing the alert.

  • Programmatic Alerts (Ending the False Positive Tax): Use the API's specialized scoring and prioritization endpoints to report only when critical thresholds are breached. Instead of waking an analyst for every theoretical risk, configure your systems to instantly trigger high-priority alerts only when an active ransomware event or a code secret leak is definitively verified by the Exposure Priority API.

Ready to Take Command?

👉 Existing Users: Log in to your ThreatNG platform today. Navigate to the Specialized Reports section to dismantle your brand exposure, adjust your Policy Management settings to silence the noise, and head to the developer portal to start piping DarCache intelligence directly into your offensive workflows.

👉 New Users: Ready to experience an EASM and Digital Risk Protection platform that actually reduces your workload and starves threats before they launch? Contact us today for a free evaluation and see the power of Contextual Certainty in action.

Next
Next

March 12, 2026