Overview

This section groups ThreatDefence capabilities for discovering, monitoring, and reducing your external attack surface. Use the pages below to configure monitoring, interpret findings, and operationalise remediation.


Contents

  • External Attack Surface Management (EASM) Continuous discovery of internet-facing assets (domains, subdomains, IPs, services, tech stacks) with change tracking and exposure prioritisation.

  • Dark Web Monitoring Credential and data leakage monitoring across dark-web sources, stealer logs, and breach dumps; alerting and takedown guidance.

  • Look-Alike Domains Identification and scoring of look-alike domains (fuzzy, homoglyph, typosquat); registrar intelligence and blocking/takedown playbooks.

  • Vulnerability Scans Lightweight, recurring scans of discovered assets; export of findings, CVSS/CISA KEV context, and remediation tracking.


Last updated