Cybersecurity Products

C

Cybersecurity, in a broad context, refers to the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Effective cybersecurity involves a layered defense across various domains, as detailed below.

Endpoint Security (EDR/AV)

Endpoint security focuses on securing individual devices—the "endpoints" of the corporate network—such as laptops, desktops, servers, mobile phones, and tablets.

  • Antivirus (AV): Traditional AV software uses signature-based detection (matching files against a database of known malware) to prevent, detect, and remove malicious software.

  • Endpoint Detection and Response (EDR): EDR is a more advanced, modern solution. Instead of relying solely on known signatures, EDR continuously monitors endpoint activity, recording all system events (file changes, process execution, network connections). It uses behavioral analysis and machine learning to detect suspicious activity, provide context for security incidents, and offer automated or manual capabilities to quickly respond to and remediate threats, such as isolating a compromised device.

  • Context in Cybersecurity: EDR is critical because most sophisticated attacks (like ransomware and file-less malware) bypass traditional AV. EDR provides the necessary visibility and speed to stop these intrusions before they can cause significant damage or spread laterally across the network.

Cloud & Infrastructure Security (CNAPP)

This domain focuses on securing the resources, services, and environments hosted in the cloud, extending protection from the core infrastructure up to the applications and code.

  • Cloud-Native Application Protection Platform (CNAPP): CNAPP is an emerging, unified security platform designed to secure applications from "code to cloud." It consolidates multiple cloud security tools, including:

    • Cloud Security Posture Management (CSPM): Checks for misconfigurations and compliance violations within the cloud environment (e.g., publicly accessible storage buckets, weak IAM policies).

    • Cloud Workload Protection Platform (CWPP): Secures the specific workloads running in the cloud, such as virtual machines, containers, and serverless functions.

    • Cloud Infrastructure Entitlement Management (CIEM): Manages and governs permissions for both human and machine identities, addressing the primary risk of over-privileged access.

  • Context in Cybersecurity: CNAPP is essential for implementing the Shared Responsibility Model by helping customers secure the elements they are responsible for (data, configuration, identity, and application code) across dynamic, multi-cloud environments.

Web & Network Security

This category focuses on protecting the network perimeter, regulating traffic, and securing web applications that are accessible via the internet.

  • Web Application Firewalls (WAF): WAFs sit in front of web applications (like e-commerce sites or internal portals) to filter and monitor HTTP traffic. They protect against common web attacks such as SQL injection, Cross-Site Scripting (XSS), and denial-of-service (DoS) attempts, safeguarding the integrity and availability of online services.

  • Firewalls (Traditional and Next-Generation): Firewalls are foundational network security controls that inspect incoming and outgoing network traffic. Next-Generation Firewalls (NGFWs) go beyond basic packet filtering to include application-level awareness, intrusion prevention systems (IPS), and deep packet inspection to block modern threats.

  • Context in Cybersecurity: Web and Network Security establishes and enforces the perimeter, acting as the first line of defense to prevent unauthorized access and traffic from reaching internal resources or vulnerable web applications.

Email & Phishing Security

This domain addresses the primary communication channel and a top vector for initial compromise: email.

  • Email Security Gateways (SEG): SEGs are deployed to filter emails before they reach a user's inbox. They check for known malware, spam, and malicious links.

  • Phishing and Awareness Training: Sophisticated attacks use social engineering (Business Email Compromise or BEC) to trick employees into transferring funds or handing over credentials. Security solutions in this area now include advanced analysis (e.g., checking sender reputation, analyzing email content for suspicious language) and frequent, randomized phishing simulation exercises to train employees to recognize and report threats.

  • Context in Cybersecurity: Since approximately 90% of cyberattacks start with an email, effective email and phishing security is non-negotiable. It targets the human element of security, which is often the weakest link, protecting against credential theft and malware delivery.

ThreatNG, as an external attack surface management (EASM) and digital risk protection (DRP) solution, is highly effective in securing all four categories of cybersecurity by providing a crucial outside-in perspective. It focuses on finding the visible, exploitable exposures that an attacker would use to bypass or compromise the layers defined by Endpoint, Cloud, Web & Network, and Email & Phishing Security.

ThreatNG’s External Discovery and Continuous Monitoring

ThreatNG performs purely external unauthenticated discovery to map an organization's full digital footprint. This is essential because even the most robust internal security tools (like CNAPP or EDR) cannot secure assets that the organization doesn't know exist.

  • Continuous Monitoring: Since security perimeters are dynamic, especially with cloud adoption, ThreatNG provides constant monitoring of the external attack surface, ensuring that any new, exposed asset or configuration change is immediately detected.

  • Mobile App and Cloud Exposure: ThreatNG specifically discovers Mobile Applications and Cloud and SaaS Exposure (AWS, Azure, GCP). This directly addresses shadow IT and misconfigurations that often bypass CNAPP (Cloud & Infrastructure Security). If an organization’s mobile app (monitored by ThreatNG) exposes a hardcoded cloud key, this alert preempts a compromise that a CNAPP solution might only detect after a breach has begun.

External Assessment Capabilities

ThreatNG’s External Assessment assigns specific risk scores that highlight the attacker’s most likely path of entry, providing immediate threat prioritization across all security domains.

  • Data Leak Susceptibility: This score is highly relevant to Endpoint, Cloud, and Email Security. It is derived from Cloud and SaaS Exposure and Dark Web Presence (Compromised Credentials).

    • Example: A high score indicates that email login credentials or corporate network credentials have been found in DarCache Rupture (Compromised Credentials). This is a direct precursor to a successful attack against Email & Phishing Security and the subsequent Endpoint Security of the affected user.

  • BEC & Phishing Susceptibility: This assessment directly supports Email & Phishing Security. It uses Domain Intelligence to identify DNS misconfigurations and the presence of Domain Name Permutations (typosquatting).

    • Example: ThreatNG identifies that a threat actor can easily register a look-alike domain (micros0ftcorp.com) because the real domain's DNS is weak. This flags the organization as highly susceptible to Business Email Compromise (BEC), informing the security team to implement stronger email filters and training.

  • Breach & Ransomware Susceptibility: This score addresses weaknesses in Web & Network Security and Cloud & Infrastructure Security (IaaS). It considers exposed sensitive ports and known vulnerabilities.

    • Example: The assessment identifies an exposed RDP port on a virtual machine hosted in Azure that has not been properly patched against a known vulnerability. This is a clear path for a threat actor to gain initial access and deploy ransomware, bypassing the network firewall.

Investigation Modules and Technology Identification

ThreatNG’s Investigation Modules use multiple intelligence streams to confirm technologies in use and find leaked secrets, providing essential context for the security team.

  • Technology Identification (Domain and Subdomain Intelligence): This identifies the external presence of specific technologies relevant to each security category.

    • Example: For Web & Network Security, it identifies the Content Delivery Network (CDN) or Web Server software (e.g., Apache, Nginx) being used by the web application. If a known vulnerability exists in that specific version, ThreatNG can link it to the DarCache Vulnerability data, prioritizing immediate patching.

    • Example: For Endpoint Security, it can identify the presence of a specific VPN technology used for remote access. ThreatNG then focuses its assessment on the security of that specific login portal.

  • Code Secret Exposure: This directly helps prevent attacks that leverage leaked secrets against Cloud & Infrastructure Security and Web & Network Security APIs.

    • Example: ThreatNG discovers an exposed GitHub repository that contains configuration files with a valid, non-expired Cloud API Key for a serverless function. This highly sensitive finding (a precursor to Over-Privileged Access) allows the security team to revoke the key immediately before an attacker can use it.

Intelligence Repositories (DarCache)

The Intelligence Repositories ensure that ThreatNG’s findings are prioritized based on active, real-world threats.

  • DarCache Rupture (Compromised Credentials): This directly supports the integrity of Endpoint, Email, and Cloud access. It continuously checks for compromised login credentials and API keys that could grant unauthorized access to corporate email, VPNs, or cloud consoles.

  • DarCache Vulnerability (NVD, EPSS, KEV, eXploit): This ensures that remediation efforts are focused. For Web & Network Security and IaaS components, a vulnerability is scored highest if it is on the KEV (Known Exploited Vulnerabilities) list and has an associated Verified Proof-of-Concept Exploit in DarCache eXploit.

Complementary Solutions

ThreatNG's external focus creates powerful synergies when combined with the internal security tools listed above:

  1. Endpoint Security (EDR/AV) Synergies: ThreatNG identifies external threats (e.g., compromised VPN credentials via DarCache Rupture or phishing via BEC & Phishing Susceptibility). This actionable intelligence can be fed to EDR systems to prioritize monitoring of the specific user or system whose credentials were leaked, or to automatically isolate an endpoint that attempts to connect to a malicious domain identified by ThreatNG.

  2. Cloud & Infrastructure Security (CNAPP) Synergies: CNAPP tools manage internal cloud configurations and identity risks. ThreatNG acts as an external auditor, flagging public misconfigurations like exposed cloud storage or services. The Cloud and SaaS Exposure findings serve as a critical prioritization layer for CNAPP, focusing remediation efforts on the few misconfigurations that are internet-facing and easily exploitable.

  3. Web & Network Security Synergies: ThreatNG's Web Application Hijack Susceptibility and Breach & Ransomware Susceptibility findings provide intelligence on the actual, exploitable weaknesses in the firewall-protected perimeter. This data can be directly used to fine-tune WAF rules or update the Network Firewall’s access control lists, blocking the specific ports or protocols ThreatNG has identified as unnecessarily exposed.

  4. Email & Phishing Security Synergies: The external threat intelligence on look-alike domains and DNS weakness from BEC & Phishing Susceptibility is directly used to enhance Email Security Gateways (SEGs). SEG rules can be updated to reject emails originating from the typosquatting domains discovered by ThreatNG, stopping the phishing attempt before it reaches a user's inbox.

Previous
Previous

DevOps

Next
Next

Cloud Infrastructure