Introducing Dynamic API Scanning
Application environments are more complex than ever, with APIs forming the critical connective tissue. But this proliferation has created a vast, often invisible, attack surface. …
Customers often tell us of instances where someone in their team spins up a new machine that isn’t using an approved geolocation, or that they see an unexpected spike in hosting from a particular country. These anomalies can put an organization at risk, especially since they are difficult to spot in an automated way.
It’s not uncommon that we hear from customers that someone spins up a new machine that isn’t using an approved geolocation or even a sudden spike in hosting from an approved country. These sorts of anomalies can put an organization at risk, especially since they are difficult to spot in an automated way. Therefore, having an easy way to keep track of them is critical.
With Detectify’s new IP view, customers can now see a complete list of all IPs they are pointing to across their entire attack surface. For each IP, we show what 1) hosting provider is used, 2) which country they are located, and 3) the ASN they have.
In addition to the above, we will also show both IPv4 and IPv6 addresses. In fact, we’ve learned that 73% of our customers are using Ipv6 addresses which reflects how quickly our customers’ digital footprint is expanding.
In order to help security teams spot anomalies quickly and communicate the state of their attack surface efficiently, we will include charts on the IP page that visualize key details about the state of your attack surface.
Here is a list of all new modules recently added from our community of ethical hackers. You can find a complete list of new vulnerabilities added to Surface Monitoring and Application Scanning by viewing the “What’s New?” section in-tool.
Application environments are more complex than ever, with APIs forming the critical connective tissue. But this proliferation has created a vast, often invisible, attack surface. …
The average organization is missing testing 9 out of 10 of their complex web apps that are attacker-attractive targets. To address this, we’re launching new …