ThreatNG Solution Updates

Past 12 Months

ThreatNG Security has undergone significant enhancements in the past 12 months, solidifying its position as a leading external attack surface management, digital risk protection, and security ratings solution. Here’s a breakdown of the key additions and improvements:

Domain Intelligence:

Online Sharing Exposure:

  • Expanded Coverage of Additional Sharing Repositories: ThreatNG now investigates a broader range of online sharing repositories, providing increased visibility into potential data leaks and brand risks.

Cloud and SaaS Exposure:

  • Expanded External SaaS Identification: Enhanced capabilities to identify externally exposed SaaS applications, providing a more comprehensive view of an organization’s SaaS usage and associated risks.

Technology Stack:

  • Expanded External Technology Stack Identification: Improved identification of externally exposed technologies used by organizations, providing valuable insights into their technology stack and potential vulnerabilities.

Sentiment and Financials:

  • Securities and Exchange Commission (SEC) Cybersecurity Risk and Oversight Disclosures Analysis and Reporting: ThreatNG now analyzes and reports on SEC filings, explicitly focusing on cybersecurity risk and oversight disclosures. This provides valuable insights into publicly traded companies’ security postures and risk management practices.

Ransomware Group Intelligence:

  • Extended Coverage of Over 70 Groups and their Activities: Expanded coverage of ransomware groups and their activities, providing up-to-date intelligence on ransomware threats and trends.

Mobile Application Intelligence:

New Intelligence Repositories:

  • Bug Bounty Program Intelligence Repository: A new repository providing insights into bug bounty programs, including in-scope and out-of-scope vulnerabilities, enabling organizations to understand better and manage their vulnerability disclosure programs.

  • United States SEC Form 8-K Intelligence Repository: A new repository providing access to SEC Form 8-K filings, which disclose significant events and material information about publicly traded companies, enabling organizations to stay informed about potential risks and opportunities.

Supply Chain and Third-Party Exposure Assessment:

  • Expanded Coverage and Accuracy Enhancements: Improved accuracy and broadened coverage for assessing supply chain and third-party exposures, providing organizations with a more comprehensive view of their external risks.

Contact us to Evaluate

Experience the ThreatNG External Discovery, Assessment, Reporting, and Monitoring capabilities firsthand.

ThreatNG External Attack Surface Management (EASM) comprehensively investigates and analyzes your organization's digital exposure. Gain insight into all potential entry points for external threats, such as vulnerable systems, open ports, and exposed services. Continuously discover and assess your attack surface, ensuring no potential vulnerability goes unnoticed. Proactively identify and address security gaps, fortify defenses, and protect your digital assets from malicious actors.

Navigate the digital landscape while mitigating risks and maintaining a secure environment. ThreatNG Security's Digital Risk Protection (DRP) capabilities provide a comprehensive solution to safeguard your organization's digital assets from a wide range of risks. Continuously monitor digital presence to detect and mitigate threats like data breaches, brand impersonation, intellectual property theft, and more. Proactively identify and respond to potential risks, ensuring the integrity and confidentiality of your sensitive information.

Make data-driven decisions to enhance security and stay ahead of emerging threats. Advanced Security Ratings provide comprehensive scoring considering all external technology, strategic, operational, and financial risks. This holistic approach empowers organizations with a complete, objective, and contextual assessment of their security posture. The platform draws from the data provided by the ThreatNG Investigation Modules and Intelligence Repositories to generate actionable vulnerability and exposure scores.

Scores

ThreatNG Exposure

BEC and Phishing Susceptibility

Cyber Risk Exposure

Brand Damage Susceptibility

ESG Exposure

Breach and Ransomware Susceptibility

Web Application Hijack Susceptibility

Data Leak Susceptibility

Subdomain Takeover Susceptibility

Supply Chain and Third Party Exposure

Investigation Modules

  • Domain Intelligence for Digital Risk Protection and External Attack Surface Management

    Domain Intelligence

    Domains, Subdomains, Certificates, Emails, DNS Enumeration, Domain Name Permutations More

  • Social Media Information for Digital Risk Protection and External Attack Surface Management

    Social Media

    Live Monitoring of Twitter, Facebook, and Website Activity More

  • Source Code Exposures for Digital Risk Protection and External Attack Surface Management

    Sensitive Code Exposure

    Publicly Available Developer Code Repositories, Passwords, Configuration Files, Keys. More

  • Search Engine Dorks Exposures Digital Risk Protection and External Attack Surface Management

    Search Engine Exploitation

    Proactively Expose Information Indexed by Search Engines: IDs, Credentials, Infrastructure Data, and Sensitive Information. More

  • Cloud Vulnerabilities and Exposures for Digital Risk Protection and External Attack Surface Management

    Cloud & SaaS Exposure

    Discovery of Cloud Resources and SaaS applications (Protected, Open, Sanctioned, Unsanctioned, and Look-Alikes) More

  • Paste Sites Exposures for Digital Risk Protection and External Attack Surface Management

    Online Sharing Exposure

    Publicly Available Information Repositories (Paste Sites) More

  • Sentiment Chatter Rumors News SEC Filings Lawsuits Layoffs Digital Risk Protection and External Attack Surface Management

    Sentiment and Financials

    Alternative Organization Names, Public Filings, Funding Information, Lawsuits, Layoff Chatter, News Chatter (General and Negative) More

  • Web Archive Investigations for Digital Risk Protection and External Attack Surface Management

    Archived Web Pages

    Archived Subdomains, Potential Redirects, JavaScript endpoints, Files, Emails, Sensitive Information More

  • Dark Web Reconnaissance Investigation Digital Risk Protection and External Attack Surface Management

    Dark Web

    Safe Investigation of People, Places, and Things (Products, Services, Brands) More

  • Technology Stack Digital Footprint Digital Risk Protection and External Attack Surface Management

    Technology Stack

    Technologies Used in Public Digital Footprint More