Threat NG Staff Threat NG Staff

The Shadow Periphery: Finding the Cloud Buckets Your Client Forgot

Are you limiting your reconnaissance to the client's provided IP range while critical data leaks from "Shadow" storage buckets in the public cloud? This analysis explores the mechanics of "Shadow Cloud Buckets," demonstrating how to automate the discovery of off-scope assets to secure stealthy initial access and pivot into the internal network.

Read More
Threat NG Staff Threat NG Staff

The Glass Hotel: Why Mobile Apps and Personal Repos Are Your Client’s Biggest Blind Spot

While you exhaust billable hours bypassing the WAF, have you considered that the "Master Key" to the infrastructure might already be exposed in a developer's personal GitHub repo or a compiled mobile app? This analysis explores the "Glass Hotel" of Non-Human Identity (NHI) leaks and demonstrates how to automate the discovery of these off-scope vulnerabilities to secure "Initial Access" immediately.

Read More