Introducing Dynamic API Scanning
Application environments are more complex than ever, with APIs forming the critical connective tissue. But this proliferation has created a vast, often invisible, attack surface. …
Victor Arellano
We shipped a new feature called Groups which allows users to organize assets, such as domains, according to any logic that best suits the way their team works.
Security teams have more data about their attack surfaces than ever before. Today, Detectify continuously monitors over 3 million domains (up from 700k around this time last year). As the attack surface grows, so does that amount of data that security teams have to manage. And security teams are feeling the pinch.
We’re excited to announce Groups, a more intuitive approach to grouping assets across your attack surface. With Groups, users can organize assets according to logic that best suits their teams. For example, you might have teams that work with vulnerability and risk findings in different ways.
Groups make it possible to organize your assets in multiple ways, for instance per technology, responsibility or priority.
Have any questions about using groups? Get in touch with your Customer Success Manager or write to our support team.
We know that security teams are often managing dozens of tools to cover their expanding attack surface. With that in mind, we constantly strive to create an experience in our tool that is simple to use, regardless of how often you login. That’s why we’re excited to share that we’ve made some improvements to how users experience Detectify. In this update, we’ve split the configuration section, where our users can set up Detectify for the best coverage possible, and the insights section, where our users get continuous information about their ever changing attack surface.
We hope these changes to the navigation menu help users find the information they’re looking for quicker so they can get the most out of their attack surface insights.
Attack Surface:
Users will now be able to access all of their assets, technologies, and root assets directly from a dropdown in the menu, making it easier to find what you are looking for.
Vulnerabilities:
Users will now be able to access “open”, “fixed”, “accepted risked”, and “false positive” by selecting the drop down arrow.
As we mentioned earlier, users can now see which technologies are hosting on their attack surface. In this update, we’ve now made it possible for users to view which technologies are hosted for specific domains.
Here is a list of all new medium, high, and critical severity modules added in the recent days from our community of ethical hackers. You can find a complete list of new vulnerabilities added to Surface Monitoring and Application Scanning by viewing the “What’s New?” section in-tool.
Log in to get an overview of what is exposed on your attack surface.
We’re hiring engineers, product managers, sales, & more! Learn more.
Application environments are more complex than ever, with APIs forming the critical connective tissue. But this proliferation has created a vast, often invisible, attack surface. …
The average organization is missing testing 9 out of 10 of their complex web apps that are attacker-attractive targets. To address this, we’re launching new …