ThreatNG can facilitate the handoff to complementary solutions, such as internal vulnerability scanners or cloud security posture management (CSPM) tools, by providing them with information about potential internal exposures identified through its external attack surface management capabilities. For example, suppose ThreatNG discovers an exposed API that could be used to access internal systems. In that case, it can provide this information to an internal vulnerability scanner, which can assess the API for vulnerabilities and recommend remediation actions.

  • Exposed API Discovery and Exposed Development Environment Discovery: ThreatNG's Domain Intelligence module can identify exposed APIs and development environments that may inadvertently expose internal assets or sensitive information. It can help organizations identify potential entry points for attackers and take steps to secure them.

  • VPN Discovery: ThreatNG can discover VPN endpoints exposed to the Internet. While VPNs are designed to provide secure access to internal networks, misconfigurations or vulnerabilities in VPN implementations can expose internal assets to external threats.

  • Sensitive Code Exposure: ThreatNG's Sensitive Code Exposure module can identify exposed public code repositories that may contain sensitive information, such as passwords, API keys, or configuration files. Attackers could use this information to gain access to internal systems or data.

  • Cloud and SaaS Exposure: ThreatNG can identify unsanctioned cloud services or cloud service impersonations that employees may use to store or access sensitive data without the organization's knowledge or approval. It can also identify open exposed cloud buckets that may contain sensitive data.