
ThreatNG Solution Updates
Past 12 Months
ThreatNG Security has undergone significant enhancements in the past 12 months, solidifying its position as a leading external attack surface management, digital risk protection, and security ratings solution. Here’s a breakdown of the key additions and improvements:
Web Application Firewall (WAF) Discovery and Identification: ThreatNG now detects and identifies WAFs protecting web applications, providing valuable insights into an organization’s security posture.
Microsoft Entra (Azure Active Directory) Domain Identification and Enumeration: Expanded capabilities to identify and enumerate domains associated with Microsoft Entra (Azure AD), giving a deeper understanding of an organization’s identity and access management infrastructure.
Web3 Domains Identification: ThreatNG now identifies Web3 domains, including those that are taken and available, providing visibility into an organization’s decentralized web presence.
Vendor and Technology Identification Extended Coverage and Accuracy: Improved accuracy and expanded coverage for identifying vendors and technologies used by organizations, enabling better insights into their technology stack and potential vulnerabilities.
Subdomain Infrastructure Exposure: Enhanced capabilities to identify exposed applications, services, databases, IoT devices, embedded systems, and network infrastructure within subdomains, providing a comprehensive view of an organization’s external attack surface.
API Discovery Enhancements: Improved API discovery capabilities enable organizations to understand better and manage their API exposure.
Expanded Coverage of Additional Sharing Repositories: ThreatNG now investigates a broader range of online sharing repositories, providing increased visibility into potential data leaks and brand risks.
Expanded External SaaS Identification: Enhanced capabilities to identify externally exposed SaaS applications, providing a more comprehensive view of an organization’s SaaS usage and associated risks.
Expanded External Technology Stack Identification: Improved identification of externally exposed technologies used by organizations, providing valuable insights into their technology stack and potential vulnerabilities.
Securities and Exchange Commission (SEC) Cybersecurity Risk and Oversight Disclosures Analysis and Reporting: ThreatNG now analyzes and reports on SEC filings, explicitly focusing on cybersecurity risk and oversight disclosures. This provides valuable insights into publicly traded companies’ security postures and risk management practices.
Ransomware Group Intelligence:
Extended Coverage of Over 70 Groups and their Activities: Expanded coverage of ransomware groups and their activities, providing up-to-date intelligence on ransomware threats and trends.
Mobile Application Intelligence:
Mobile App Discovery and Intelligence Repository of Mobile App Attack Surface: ThreatNG now discovers mobile apps within various marketplaces and maintains an intelligence repository of mobile app attack surfaces, providing insights into potential mobile app vulnerabilities and risks.
New Intelligence Repositories:
Bug Bounty Program Intelligence Repository: A new repository providing insights into bug bounty programs, including in-scope and out-of-scope vulnerabilities, enabling organizations to understand better and manage their vulnerability disclosure programs.
United States SEC Form 8-K Intelligence Repository: A new repository providing access to SEC Form 8-K filings, which disclose significant events and material information about publicly traded companies, enabling organizations to stay informed about potential risks and opportunities.
Supply Chain and Third-Party Exposure Assessment:
Expanded Coverage and Accuracy Enhancements: Improved accuracy and broadened coverage for assessing supply chain and third-party exposures, providing organizations with a more comprehensive view of their external risks.

Contact us to Evaluate
Experience the ThreatNG External Discovery, Assessment, Reporting, and Monitoring capabilities firsthand.

ThreatNG External Attack Surface Management (EASM) comprehensively investigates and analyzes your organization's digital exposure. Gain insight into all potential entry points for external threats, such as vulnerable systems, open ports, and exposed services. Continuously discover and assess your attack surface, ensuring no potential vulnerability goes unnoticed. Proactively identify and address security gaps, fortify defenses, and protect your digital assets from malicious actors.
Navigate the digital landscape while mitigating risks and maintaining a secure environment. ThreatNG Security's Digital Risk Protection (DRP) capabilities provide a comprehensive solution to safeguard your organization's digital assets from a wide range of risks. Continuously monitor digital presence to detect and mitigate threats like data breaches, brand impersonation, intellectual property theft, and more. Proactively identify and respond to potential risks, ensuring the integrity and confidentiality of your sensitive information.
Make data-driven decisions to enhance security and stay ahead of emerging threats. Advanced Security Ratings provide comprehensive scoring considering all external technology, strategic, operational, and financial risks. This holistic approach empowers organizations with a complete, objective, and contextual assessment of their security posture. The platform draws from the data provided by the ThreatNG Investigation Modules and Intelligence Repositories to generate actionable vulnerability and exposure scores.
Cloud and SaaS Exposure Management: ThreatNG extends its External Attack Surface Management (EASM), Digital Risk Protection, and Security Ratings to cover cloud platforms (Amazon Web Services, Microsoft Azure, and Google Cloud Platform) and SaaS applications. Discover and assess your Cloud and SaaS footprint, identify exposed open buckets, detect unsanctioned implementations (Shadow IT), and uncover brand impersonations (Cybersquats) without agents, credentials, API connections, browser plugins, or any prior knowledge. Discover and assess interconnected third-party applications, repositories, APIs, platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS), and vendor technologies, further empowering organizations to enhance their security posture.
Third Party Risk Management: Quickly uncover, manage, and monitor third-party risks to fulfill due diligence, onboarding, and off-boarding requirements for Third Party Risk Management (TPRM). Enter a third party's domain name into the platform to discover, assess, report, and monitor their risks.
Brand Protection: ThreatNG identifies and prioritizes where your organization may be vulnerable to attacks, damage, or other negative impacts on reputation and business through the discovery and assessment of all digital brand assets: website, domains, subdomains, applications, cloud resources, SaaS applications, technology implemented, and social media accounts—your entire digital footprint.
Due Diligence: Perform practical, continuous, and consistent external assessments throughout the relationship lifecycle to help make informed decisions and protect against potential threats. Gain valuable information about any organization's external security posture and help identify potential risks or vulnerabilities.


Scores
ThreatNG Exposure
BEC and Phishing Susceptibility
Cyber Risk Exposure
Brand Damage Susceptibility
ESG Exposure
Breach and Ransomware Susceptibility
Web Application Hijack Susceptibility
Data Leak Susceptibility
Subdomain Takeover Susceptibility
Supply Chain and Third Party Exposure

Investigation Modules
-
Domain Intelligence
Domains, Subdomains, Certificates, Emails, DNS Enumeration, Domain Name Permutations More
-
Social Media
Live Monitoring of Twitter, Facebook, and Website Activity More
-
Sensitive Code Exposure
Publicly Available Developer Code Repositories, Passwords, Configuration Files, Keys. More
-
Search Engine Exploitation
Proactively Expose Information Indexed by Search Engines: IDs, Credentials, Infrastructure Data, and Sensitive Information. More
-
Cloud & SaaS Exposure
Discovery of Cloud Resources and SaaS applications (Protected, Open, Sanctioned, Unsanctioned, and Look-Alikes) More
-
Online Sharing Exposure
Publicly Available Information Repositories (Paste Sites) More
-
Sentiment and Financials
Alternative Organization Names, Public Filings, Funding Information, Lawsuits, Layoff Chatter, News Chatter (General and Negative) More
-
Archived Web Pages
Archived Subdomains, Potential Redirects, JavaScript endpoints, Files, Emails, Sensitive Information More
-
Dark Web
Safe Investigation of People, Places, and Things (Products, Services, Brands) More
-
Technology Stack
Technologies Used in Public Digital Footprint More