Calling all #pentest, #redteam, and #bugbounty professionals in #bengaluru, #india. I'll soon be #hiring an experienced technical lead for my #attacksurface operations team at @zerofox. The person selected for the role will report to me and manage the day-to-day tasking of that team. Also, this person could eventually be promoted to my #research team. Please contact me if you're interested in discussing the opportunity and you're not a recruiter.

#osint #recon #reconnaissance #securiy #infosec #golang #attacksurfacemgmt #automation #scalability #cloudinfrastructure #hiringnow #talentacquisition

Previously, users of #owasp @amass found this helpful:

1) amass intel -whois -config amass.ini -d domain.tld -o domains.txt

2) amass enum -config amass.ini -df domains.txt

3) amass db -names -df domains.txt -o hosts.txt

4) nmap -Pn -sV -A -iL hosts.txt -oN results.txt

#osint #recon #attacksurface #redteam #bugbounty #securityassessments #AttackSurfaceMapping #attacksurfacemgmt #opensource #opensourceintelligence

How to Prevent Breaches by Protecting Your Attack Surface - Preventing breaches begins with understanding and protecting your attack surface.... http://feedproxy.google.com/~r/securityweekly/XBIC/~3/toNoCG7MuXY/ #applicationsecurity #penetrationtesting #attacksurfacemgmt #cloudsecurity #3rdpartyrisk #datasecurity #articles
How to Prevent Breaches by Protecting Your Attack Surface - Security Weekly

Preventing breaches begins with understanding and protecting your attack surface. For most enterprises, their attack surface is huge. To help wrangle it, security professionals have struggled for years to use tools such as network mapper (nmap) or vulnerability scanners to discover and test the security of internet-exposed assets; these typically present a path of least […]

How Cloud Defenders Thwart Attacks Against Resilient Services - The introduction of containers and micro-service architectures have changed the w... http://feedproxy.google.com/~r/securityweekly/XBIC/~3/5xeuBcZN4ic/ #networktrafficanalysis #applicationsecurity #securityoperations #attacksurfacemgmt #containersecurity #incidentresponse #cloudsecurity #articles #blueteam #devops
How Cloud Defenders Thwart Attacks Against Resilient Services - Security Weekly

The introduction of containers and micro-service architectures have changed the way we develop, deploy, and run our applications.  Not only has this changed application development, but it’s also created some visibility challenges for application security.  Move those applications to the cloud and we only amplify those challenges.  How do we architect our cloud services and […]

How Can We Vaccinate Our Networks? - Security Weekly

The news is flooded with updates regarding the COVID-19 vaccine.  Cyberattacks are targeting the vaccine supply chain.  Phishing attacks are exploiting sign-ups for the vaccine.  There are even attacks to get access to vaccine data.  Sounds a lot like our enterprises every day!  We’re all learning about human immunology from the headlines, but what are […]

Phishing: The Gift that Keeps on Giving - Security Weekly

When we talk about legacy security challenges and solutions, we can’t forget about our old friends email and phishing.  Phishing has been around for over 20 years and is still one of the most effect attack paths to steal credential, exploit endpoints, and deploy malware.  After 20 years, you’d think we could find effective solutions […]

Securing, Monitoring, and Remediating Immutable Infrastructure - Security Weekly

We’ve all heard the term Immutable Infrastructure, especially with cloud deployments, but what does it really mean?  What are the security and compliance impacts of Immutable Infrastructure? Let’s start with a quick overview of Immutable Infrastructure.  Simply defined, Immutable Infrastructure means that the state of networks, servers, applications, etc. are not subjected to change in […]