Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Attack Surface Management: From Passive Scanning to Active Security Testing

Traditionally, approaches to Attack Surface Management (ASM) went something like this: A business scanned its own IT estate to discover assets and understand what its attack surface actually included. We can think of this as Phase I. Following the completion of an asset inventory, they assessed each of their assets to identify risks and vulnerabilities, such as open ports, certificate issues, DNS misconfigurations, and more.

What is External Attack Surface Management (EASM)?

External attack surface management (EASM) is the continuous exercise of managing cybersecurity risks associated with an organization’s external-facing digital assets. The process includes monitoring, identifying, reducing, and mitigating risks present across an organization’s external attack surface.

Emerging Threat: Palo Alto PAN-OS CVE-2024-3393

CVE-2024-3393 is a high severity (CVSS v4.0 score 8.7) Denial of Service (DoS) vulnerability affecting specific versions of Palo Alto Networks PAN-OS DNS Security feature. This vulnerability allows unauthenticated attackers to send malicious packets through the data plane of the firewall. This forces the firewall to reboot. Repeated attempts can force the firewall into maintenance mode, requiring security teams to manually reset the firewall and significantly disrupting operations.

CTEM: Closing the Cloud Security Gap

In today’s rapidly evolving threat landscape, traditional reactive security approaches are no longer sufficient. This reality led Gartner to introduce Continuous Threat Exposure Management (CTEM) to shift organizations’ mindset from reactive firefighting to proactive threat management through five critical phases: This structured approach revolutionizes how organizations secure their cloud environments. But to succeed, CTEM demands specialized tools designed for modern cloud complexities.

Emerging Threat: Apache Struts CVE-2024-53677

CVE-2024-53677 is a critical (9.5) remote code execution (RCE) vulnerability affecting Apache Struts, an open-source framework for building Java-based web apps. This vulnerability affects the framework’s file upload logic, allowing attackers to enable paths traversal and perform remote code execution using malicious files.

Exploited! Kerio Control's HTTP Response Splitting Vulnerability (CVE-2024-52875)

CVE-2024-52875 is an HTTP Response Splitting vulnerability in Kerio Control. This flaw allows an attacker to inject malicious input into HTTP response headers by introducing carriage return (\r) and line feed (\n) characters. Such manipulation can cause the server to send multiple HTTP responses instead of one, leading to various attacks.

Critical Features Your Attack Surface Management Tool Must Have

Attack surface management (ASM) is becoming a vital tool for any organization that utilizes digital assets or is undergoing digital transformation. Whether it’s web applications, IoT devices, or endpoint entry points, every digital asset escalates an attack surface in complexity and size.

Need to boost the value of your security budget in 2025? Here's how.

If you are like many CISOs, you feel pressure to increase the value of your security testing budget. And if you are one of the 53% of enterprises reporting stagnant or decreasing budgets in 2024, you have even more work cut out for you. Increasing testing value requires a re-evaluation of nearly everything. Tackle tool sprawl. Optimize workflows. Reduce false positives. Review cloud spend. All while demonstrating ROI even in the absence of incidents. This post is about ways to reach these goals.