#AttackSurface

2025-06-05

Just released! Our Top Cybersecurity Control selection for Q2 2025 is Continuous Vulnerability Management (CVM).

Why CVM? We’ve analyzed the trends, and today’s threat landscape demands more than periodic scans and reactive fixes. Attackers are exploiting new vulnerabilities within hours, sometimes minutes, of disclosure. You need a program that’s always on, and it’s also becoming a compliance necessity.

Read the analysis on why CVM is the top control for Q2 and how to put it into action: lmgsecurity.com/why-continuous

#Cybersecurity #ContinuousVulnerabilityManagement #VulnerabilityManagement #CVM #RiskManagement #AttackSurface #Infosec #IT #Cyberaware #CISO #Compliance #CyberRisk #Security

2025-05-29

Your digital defenses might be hiding more vulnerabilities than you think. Attackers are using automation to map every potential entry point—learn how next-gen Attack Surface Management is flipping the script on cyber threats.

thedefendopsdiaries.com/enhanc

#attacksurface
#cybersecurity
#automation
#riskmanagement
#infosec

Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-04-10

It sometimes pays to run domains that serve purely as spam honeypots. Case in point: A spammer has been delivering a ConnectWise commercial remote access client application as a payload in a scam that uses the purported arrival of a US Social Security statement as its hook.

A 🧵 ...

#ConnectWise #malware #spam #malspam #attacksurface #SocialSecurity #SocialSecurityAdministration #SSA #usgov

An email that looks very much like it comes from the Social Security Administration but leads to malware.

It says "We trust that you will find the new format both informative and useful."

Dear reader, it was neither informative nor useful.
The Privacy Foundationtheprivacyfoundation
2025-04-07

Musk/DOGE is a widely exposed single point of failure for international security. All it takes is for a state to overcome the personal security of inexperienced barely-post-tweens to essentially access all American information. There is no oversight on how the people's data is being handled. This is the worst kind of attack surface possible.

Annexus Technologiesannexustechologies
2025-04-03

Your attack surface is bigger than you think. 🔍 Are you mapping every exposure point? Learn how to perform an attack surface analysis and stay ahead of threats. Book a free meeting with Annexus Technologies to stay ahead of threats: booknow.annexustech.com/#/cust

2025-04-02

A new experiment has landed in the #OpenTelemetry playground! Not to throw any shade on the awesome folks working on OpenTelemetry, but my teeth get itchy when using the contrib collector in production. *cough*attack*cough*surface* 😜 In this lab, you'll learn how to create a custom collector with just the components you need #ocb #attacksurface #supplychainattack #kitchensink github.com/booyaa/opentelemetr

Is there an attack/vector "official" report template?

I got an ongoing nation-state attack on one on my properties that I am barely keeping on top of and would like to get some help, but I would like to write it up properly before I cry wolf.

#imfosec #attacksurface is #WP

Annexus Technologiesannexustechologies
2025-03-26

Cyber threats are evolving, and your attack surface is constantly expanding. Protect your business with the right security strategies before attackers strike. Book a free discovery call with Annexus Technologies today:  booknow.annexustech.com/#/cust

Annexus Technologiesannexustechologies
2025-03-25

Jamaican businesses are expanding their digital presence—but is their cybersecurity keeping up? With rising cloud adoption and remote work, attack surfaces are growing, making organizations prime targets. Learn how to secure your digital assets.

🔗 Read more 👇👇👇

annexustech.ca/blogs/post/your

2025-01-09

Ideally, security schemes ought to _shrink_ the #AttackSurface.

But shrunken attack surfaces are not very glossy. Complexity must be introduced in order to sell bolting on yet another business plan, products and services.

Here a vulnerability and easy low-skill common point of unauthorized entry was purchased at great cost by customers thinking they were becoming safer, even as by so doing they were expanding the perimeter of their #ThreatHorizon.

theregister.com/2025/01/09/zer

2024-11-18

🛡️ If you remain uncertain about what BaseFortify.eu is about! Then check out basefortify.eu/#features and discover how to protect your #AttackSurface with our easy to use #VulnerabilityManagement tool tailored to give every #SMB the best experience. 💻🔒 #Cybersecurity

2024-08-30

#vendredilecture avec cette nuit, vers 3 heures en pleine insomnie, la fin de la lecture du deuxième livre de la série #AttackSurface par @pluralistic: #Homeland
Juste avant, c’était #LittleBrother, forcément. Palpitant !

2024-07-16

🤖🧙 MEDITATIONS OF A CYBERSCOUT 09

A TTP is a capability. It is not a material attack and it's only half the picture. Ask yourself, can this impact my organization? A threat vector is nothing without a vulnerability in your attack surface.

#ttp #attacksurface #threatmodelling

🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸schizanon
2024-06-10
🇺🇦PhotoSniperFox🇺🇦PhotoSniperFox@universeodon.com
2024-05-28

#Microsoft plans to #force all users to use #Copilot and #Recall, two non- #AI algorithms, to keep a #database of past user actions so a user can return to them.
Neat idea. How will they deal with the #security #AttackSurface it creates and how it makes you less #safe?

"Absolutely! Installing #Linux is an alternative approach to avoid using Recall on your system. Linux provides a wide range of distributions (#distros) that cater to different preferences and use cases."
Actual Microsoft Employee

computerworld.com/article/2123

#PopOS for me: pop.system76.com/

Distro finder: distrochooser.de/

2024-04-11

The Amass Project received a glowing testimonial from an organization leveraging the @owasp #attacksurface mapping system:

"For FortifyData, Amass is an invaluable tool in our arsenal for quickly and accurately determining asset footprints for cyber risk assessment. It reliably provides superior results without false positives. Further, the OAM database model provides inherent benefits beyond asset footprinting, such as identifying third parties associated with the target and nth-party detection. Working closely with the Amass team, we've watched Amass steadily enhance its capabilities. Our clients are deeply impressed with the results our platform generates using Amass data. We look forward to continuing to work with Amass and supporting its development!"

J. Eric Smith, VP Technology Services Delivery

Please let us know if your organization has a testimonial to share as well!

2024-03-18

Going to be in #nyc this upcoming Wednesday? Come learn with the @owasp Global Board!

I'll be co-hosting with @redteamblueteam and doing a talk to introduce the new @amass project that builds your attack surface mapping infrastructure!

#infosec #cyber #cybersecurity #security #recon #reconnaissance #attacksurface #attacksurfacemanagement

meetup.com/owasp-new-york-city

2024-02-07

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst