Overview
This section groups ThreatDefence capabilities for discovering, monitoring, and reducing your external attack surface. Use the pages below to configure monitoring, interpret findings, and operationalise remediation.
Contents
External Attack Surface Management (EASM) Continuous discovery of internet-facing assets (domains, subdomains, IPs, services, tech stacks) with change tracking and exposure prioritisation.
Dark Web Monitoring Credential and data leakage monitoring across dark-web sources, stealer logs, and breach dumps; alerting and takedown guidance.
Look-Alike Domains Identification and scoring of look-alike domains (fuzzy, homoglyph, typosquat); registrar intelligence and blocking/takedown playbooks.
Vulnerability Scans Lightweight, recurring scans of discovered assets; export of findings, CVSS/CISA KEV context, and remediation tracking.
Last updated