Amit Singh

ways ro prevent & identify sub-domain takeover vulnerability

2 Ways to Identify & Prevent Subdomain Takeover Vulnerability

Subdomain Takeover is a type of vulnerability which appears when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Bitbucket, Desk, Squarespace, Shopify, etc) but the service is no longer utilized. In this article, we have identified top 2 ways to identify and prevent subdomain takeover risk. Subdomain Takeover (Simple Definition):… Read More »2 Ways to Identify & Prevent Subdomain Takeover Vulnerability

Top Open Source Tools to detect Subdomain takeover risk

Top Open Source Tools to detect Subdomain takeover risk

Subdomain Takeover is a type of risk which exists when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Bitbucket, Desk, Squarespace, Shopify, etc) but the service is no longer utilized (deleted or migrated). We have complied a list of Top Open Source Tools to detect Subdomain takeover risk. A well-known… Read More »Top Open Source Tools to detect Subdomain takeover risk

Top 6 Subdomain Takeover attacks on Uber, Lamborghini, USA.gov

Top 6 Subdomain Takeover attacks on Uber, Lamborghini, USA.gov

One of the major pain point for large enterprises is not knowing their digital infrastructure completely. Hackers are constantly looking for these soft targets. Subdomain Takeover is a type of vulnerability which occurs when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Amazon, Bitbucket, Desk, Squarespace, Shopify, etc) but the… Read More »Top 6 Subdomain Takeover attacks on Uber, Lamborghini, USA.gov

Uber Subdomain takeover

Analysing/Dissecting Uber Subdomain Takeover Attack

Subdomain Takeover is a type of vulnerability which appears when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Bitbucket, Desk, Squarespace, Shopify, etc) but the service is no longer utilized or has been migrated/deleted. In this blog, we will be dissecting Uber Subdomain takeover vulnerability which was further escalated to… Read More »Analysing/Dissecting Uber Subdomain Takeover Attack

Steps to Secure Enterprise Digital Footprint

4 Steps To Secure Enterprise Digital Footprints

As previously we talked briefly about digital footprint and how to manage it in our blog 4 Ways To Manage Enterprise Digital Footprint. Here we will talk in details about how to Secure Enterprise digital footprints. An Enterprise Digital Footprint is an inventory of all the digital assets over internet (web, mobile, individual, social etc) related to an enterprise… Read More »4 Steps To Secure Enterprise Digital Footprints

Why Organizations must do cybersecurity Maturity Assessment

Top 5 Benefits: Why Organisation Must Do CyberSecurity Maturity Assessment ?

How does Your Current CyberSecurity Posture looks like ? Where does your security strategy stand? What are your biggest risks? Where should you focus your efforts? Where do you stand with respect to your peers ? Why CyberSecurity Maturity Assessment ? Majority of the answers for above questions for an organisation lies in its Cyber Security… Read More »Top 5 Benefits: Why Organisation Must Do CyberSecurity Maturity Assessment ?

Information Security Metrics and Dashboard for the CEO / Board

It is very important to properly define the right Information Security Metrics for an organization to estimate the security structure and to communicate it efficiently to the Board level executives.There is a growing interest from the Board and the CEO to understand the information security posture of the company. Many of the CISOs I know… Read More »Information Security Metrics and Dashboard for the CEO / Board