Navigation
  • SEARCH HERE
  • SOLUTIONS
    • Information Security Solutions
      • Application Security Testing Solutions
      • Network & Infrastructure Security Solutions
      • Zero Trust Security
      • Security Information and Event Management
      • Remote Monitoring & Management (RMM)
      • File Integrity Management
      • Systems Administration Tools
      • Data Loss Prevention
      • Data / Password Recovery
      • IT Management Solutions
      • Identity and Access Management Solutions
      • Employee Activity Monitoring (EAM)
      • Digital Forensic Investigation
    • Software Development Solutions
      • Integrated Development Environments
      • Development Components
        • UI Tools
        • Networking Components
        • Office Components
        • Barcode Components
        • Communication Components
      • Imaging Solutions
      • Software Localization
      • Release Automation & Management
      • eLearning Authoring Solutions
      • Charting Solutions
      • PDF Solutions
      • Reporting Solutions
      • Testing & QA
      • Text Retrieval / Enterprise Search
      • Database
  • Services
    • Live Solution Walkthroughs
    • Implementation Services
    • Best Practices Consulting
    • Pre-Sales and Post-Sales Services
  • What's New
    • Our Event
    • Our Blogs
    • Special Offers
  • About
    • About LOGON Software Asia
    • Our Partnership
  • Publishers - Join our network
  • Resellers - Expand your portfolio
  • Procurement Managers
Site logo
  • Solutions
    • Information Security Solutions
          • Identity and Access Management
            • Privileged Access Management (PAM)
            • Multi-Factor Authentication (MFA)
            • Identification Verification (IV)
            • Self-Service Password Reset (SSPR)
          • Network & Infrastructure Security
            • DDoS Mitigation and Protection
            • Digital Forensic Investigation
            • Malware Detection & Analysis
            • Network Monitoring Software
            • Email Security
            • Log Monitoring
          • Endpoint & Device Security
            • Patch Management
            • Remote Monitoring & Management (RMM)
            • Employee Activity Monitoring (EAM)
            • Mobile Device Management (MDM)
          • IT Management
            • IT Service Management
            • IT Asset Management
            • Software Asset Management
            • Hardware Asset Management
            • Software License Management
            • Systems Administration Tools
          • Application Security
            • Application Security Testing (SAST, DAST, IAST, MAST, SCA)
            • Runtime Application Self-Protection
            • Web Application Firewall
          • Data Security
            • Data / Password Recovery
            • File Integrity Management
            • Data Loss Prevention
          • Cloud Security
            • Cloud Security Posture Management
            • Cloud Work Protection
          • External Attack Surface Management
            • Cyber Threat Intelligence
            • Third Party Risk Management
          • Security Operations & Incident Management
            • Security Information and Event Management
            • Security Orchestration, Automation and Response (SOAR)
          • Zero Trust Security
    • Software Development Solutions
      • Integrated Development Environments
      • Imaging Solutions
      • UI Tools
      • Charting Solutions
      • Developer Tools
      • Database
      • Networking Components
      • Office Components
      • Barcode Components
      • Release Automation & Management
      • Software Localization
      • Communication Components
      • Automated Testing
      • eLearning Authoring Solutions
      • Reporting Solutions
      • Text Retrieval / Enterprise Search
      • Testing & QA
  • Services
        • Live Walkthrough Sessions

          Experience the full feature of our key solutions through live platform

          View All Sessions >
        • Implementation Services
        • Pre-Sales and Post-Sales Services
        • Best Practices Consulting
  • Partners
    • Our Partners
    • Partner with LOGON Today!
      • Vendors - Join Our Network
      • Resellers - Expand Your Portfolio
      • Procurement Managers
  • Resources
        • ABOUT US

        • About Us
        • Our Locations
        • Careers@LOGON - We are hiring !
        • DISCOVER

        • Our BlogsNEW BLOGS
        • Our EventsJOIN UPCOMING EVENTS
        • LOGON to CyberSecurity PodcastNEW EPISODES
        • GET HELP

        • Contact Us
        • Help Desk
        • Request a Demo
        • Request a Quote
  • More results...

Mitigate threats from your growing attack surface with

External Attack Surface Management (EASM)

Identify potential vulnerabilities in your public internet-facing assets, both known and unknown, monitor your vulnerabilities, public-cloud misconfiguration, exposed credentials, or other external information and processes that attackers could exploit, and close security gaps.

Contact our EASM Solution specialist today

We are happy to answer your inquiries and support your needs regarding our EASM Solutions.

This field is for validation purposes and should be left unchanged.
This field is hidden when viewing the form
Image

Why You Need EASM Tools

Shadow IT

The rise of Software as a Service (SaaS) and cloud tools has led to employees using unapproved software, constituting part of an organization’s external attack surface. Security teams may be unaware of these unmanaged tools, making them difficult to secure.

Distributed IT Environments

The growth of cloud computing and remote work has decentralized IT environments, blurring the lines between public and private spaces and complicating the management of external attack surfaces.

Security Complexity

Organizations face various cybersecurity threats and utilize multiple security solutions. This increases management difficulty and the volume of data that security teams must analyze and respond to.


Keep track of all your assets exposed to the internet, including websites, servers, cloud services, and APIs

Secure your External Assets in 3 Steps

  • 1. Asset Discovery & Monitoring
  • 2. Digital Risk Protection
  • 3. Cyber Threat Intelligence

1. Asset Discovery & Monitoring

Asset Discovery is a core function of EASM.

Our EASM Solutions help organizations to identify, inventory, and continuously monitor their internet-facing assets.

We assure you that even unknown, unmanaged, or forgotten assets—often referred to as “shadow IT”—are identified and brought under security management.

Image

2. Digital Risk Protection

Digital risk protection works as a multi-layered approach to protecting an organization from online threats.

Our reliable DRP solutions include the following 3 components:

Threat Information Engine
This automated system scans the internet—Clearnet, darknet, and social media—using keywords to identify potential threats and generate alerts for analysis.
Counterintelligence
Counterintelligence analyzes threats found by the Threat Information Engine, assessing their impact on security and reputation. It also includes manual scraping to find threats missed by automated systems.
Intelligence Operations
Intelligence Operations focus on proactive threat prevention. The team uses tactics like sock puppet accounts to infiltrate threat groups and monitor activities, aiming to thwart ongoing and future attacks.
Image

3. Cyber Threat Intelligence

Our CTI solutions provide organizations with valuable insights into emerging threats, enabling them to proactively protect their systems and data.

These approaches include:

General Threat Landscape Monitoring
Threat Intelligence Analysis
Indicator of Compromise (IOC) Development
Data Theft Detection
Image

Use Cases for EASM

  • DevOps Credentials Leaked to GitHub
  • Forgotten Subdomain Points to Test VPN Login
  • Jenkins Server Exposed to Internet
  • Expired Domain Hijacked for Phishing
  • Executive Impersonation on LinkedIn
  • Misconfigured Azure Blob Exposes PII
  • Typosquatted Domain Used for Phishing

DevOps Credentials Leaked to GitHub

Incident

During a late-night hotfix, a DevOps engineer working remotely pushed a Python script to a public GitHub repo.

The script contained embedded AWS IAM credentials with admin-level privileges.

Within 8 hours, the credentials were harvested by a crypto mining bot and used to spin up 24 EC2 instances across 3 regions.

The incident wasn’t detected until an unexpected AWS billing alert triggered. Total loss: $12,300 in 24 hours.

 

Implementation:

  • Detected the AWS key within 30 minutes of being posted
  • Enriched the alert with repository link, timestamp, author, and potential impact
  • Correlated the leaked key to your organization’s GitHub activity using domain and email intelligence
  • Enabled immediate IAM key revocation and rotation before the blast radius expanded
Image

Forgotten Subdomain Points to Test VPN Login

Incident

vpn-emea.clientname.com — a subdomain tied to a decommissioned test VPN in Frankfurt — was left active months after an M&A transition.

The login page used default OpenVPN credentials and lacked 2FA.

Shodan indexed the asset, and it appeared on multiple low-tier hacking forums under “low-hanging fruit” lists.

Credential stuffing attempts from Ukrainian and Vietnamese IPs followed within 72 hours, with at least one successful login traced to a test account still active in the internal Jira system.

 

Implementation

  • Detected the forgotten subdomain as part of continuous external asset mapping
  • Flagged the endpoint as high-risk due to exposed login panel + lack of 2FA
  • Enriched alert with associated certificates and SSL fingerprints
  • Provided remediation recommendations to decommission and update DNS records
Image

Jenkins Server Exposed to Internet

Incident

A new Jenkins instance was deployed for an upcoming product release and assigned a public IP without firewall restriction.

The server, accessible on port 8080, had no authentication configured due to testing shortcuts.

Attackers discovered the service via Censys.io, installed a malicious plugin, and exfiltrated the secrets.xml file containing API keys for production services, including Slack webhooks and Jira tokens.

 

Implementation

  • Detected the Jenkins instance via external service exposure scanning
  • Identified it as vulnerable due to version fingerprinting and lack of authentication
  • Prioritized alert based on critical asset correlation (e.g., matching org domain, Git commit references)
  • Suggested access control fixes and helped initiate emergency patch workflows
Image

Expired Domain Hijacked for Phishing

Incident

After a global brand transition, the domain retailgroupindia.com — used for supplier onboarding — expired quietly.

An attacker re-registered it, cloned your vendor portal, and sent phishing emails to active suppliers requesting re-verification of PAN cards and bank details.

Over 30 supplier accounts were compromised, leading to fake invoices being submitted and paid before the fraud was detected.

 

Implementation

  • Detected domain expiration and flagged it in real-time as a high-risk asset
  • Notified your team when the domain was re-registered by a third party
  • Detected that the new DNS pointed to a phishing infrastructure with reused SSL certs from previous scams
  • Offered takedown support via brand protection workflows and legal escalation paths
Image

Executive Impersonation on LinkedIn

Incident

A threat actor created a fake profile of your CFO using a publicly available headshot, matching titles, and recent post activity.

They connected with over 40 employees across HR and Finance over a week.

Via LinkedIn InMail, they requested employees wire funds to a “confidential M&A escrow account.” One junior controller sent €270,000 before realizing the fraud.

Implementation

  • Detected the fake profile using AI-based identity monitoring and fuzzy image matching
  • Correlated LinkedIn activity patterns with anomalous impersonation attempts across other execs
  • Flagged urgent alert to brand protection team and initiated takedown request to LinkedIn Trust & Safety team
  • Helped create internal awareness campaign around executive impersonation risks
Image

Misconfigured Azure Blob Exposes PII

Incident

A marketing agency partner stored customer onboarding files in an Azure Blob container for survey analysis.

The container had public read access enabled and lacked index blocking — allowing Google to index over 3,000 PDFs.

The data included names, Aadhaar IDs, mobile numbers, and preferred insurance coverage.

A journalist discovered the leak via a Google search and published an exposé the next day.

 

Implementation

  • Detected exposed Azure blob using cloud scanning against third-party asset surfaces
  • Identified PII based on content classification: IDs, personal forms, and location metadata
  • Alert included direct links, hosting region, and Azure blob URI
  • Enabled rapid contact with the third-party agency and remediation via access controls and DMCA notice
Image

Typosquatted Domain Used for Phishing

Incident

The attacker registered secure-portal-login[.]org, mimicking your Okta login.

Using a pretext that employees must “urgently reset their MFA,” they sent SMS messages targeting users in your Singapore office.

The phishing site used cloned HTML and a valid SSL certificate from Let’s Encrypt.

Within 24 hours, 17 valid login credentials were submitted before the campaign was shut down.

 

Implementation

  • Detected typosquatted domain at time of registration using WHOIS monitoring + lexical similarity models
  • Flagged high-risk due to brand keyword + TLS cert + observed hosting on a known bulletproof provider
  • Alerted your SOC with attack vector analysis and initiated coordinated takedown with the registrar
  • Helped you proactively block future lookalikes and train staff against phishing indicators
Image

Related EASM Blogs

Maximize your Cybersecurity ROI: Strategies for Smart Risk Prioritization

As businesses rapidly adopt new technologies, move to the cloud, and rely more on third-party vendors, they unknowingly expand their...
Read More

ImmuniWeb Launches an Advanced Third-Party Risk Management (TPRM) Solution

Originally published by ImmuniWeb. ImmuniWeb has launched ImmuniWeb® Discovery TPRM, providing an in-depth overview of vendor cyber risks and incidents,...
Read More

When Visibility Ends, Risk Begins: How A Bank Took Control of Its Digital Footprint with EASM

For most banking companies in the APAC region, digital transformation isn’t just a buzzword—it is their reality. As a growing...
Read More

The New Fileless Remcos RAT Malware

Cybercriminals are now leveraging an Excel vulnerability (CVE-2017-0199) in a recent phishing campaign to deliver a fileless variant of Remcos...
Read More

Over 470,000 Personal Data at risk: Data Breach at Oxfam Local Hong Kong

Oxfam Hong Kong recently fell victim to a cyberattack that potentially compromised the personal data of over 470,000 individuals, including...
Read More

Hong Kong Hospital Cyber Attack 2024: Lessons Learned and Steps Forward

We are here to investigate the recent cyber attack at one of Hong Kong’s Hospitals. The attack disrupted operations and...
Read More

2023 Rewind: What to Expect for Cyber Security in 2024?

The Boardroom Cybersecurity Report 2023 projects that organizations will allocate $9.5 trillion for cybercrime in 2024, rising to $10.5 trillion...
Read More

Using predictive AI to protect against holiday phishing scams and other brand threats | Bfore.AI

Originally published by Bfore.AI. Businesses face significant cybersecurity challenges during peak shopping, particularly with fake domains and phishing attacks. These...
Read More

BforeAI Recognized Again in Latest Gartner® Emerging Tech Reports | Bfore.AI

Originally published by Bfore.AI. BforeAI has been acknowledged in two Gartner® Emerging Tech reports in late 2023 – as a...
Read More

Top Crypto-Focused Malware Unveiled Amid Escalating Cyber Threats

In a recent report, BlackBerry's cybersecurity arm revealed a concerning surge in crypto-focused malware as cyber threats continue to rise...
Read More

MOVEit Cyber Attack: cl0p Ransomware Gang Strikes Again

The cl0p ransomware gang strikes again, compromising organizations through the MOVEit file transfer protocol. With high-profile victims like EY and...
Read More

Unpacking the Cyber Threat Landscape in APAC: Insights from the Threat Intelligence Index

In recent years, Asia has become a hub for technology innovation, attracting businesses worldwide. However, as technology advances, so do...
Read More

Why You Shouldn’t Overlook Identifying Exploitable Vulnerabilities in your Attack Surface

In today's interconnected world, businesses rely heavily on technology to streamline their operations. However, this reliance also makes them vulnerable...
Read More

Threat Actors. Who is Attacking Us? | Bfore.AI

Originally published by Bfore.AI. This article helps you understand the reasons behind brand attacks, so companies can develop more effective...
Read More

Open Source Software Risks: How to Identify and Remediate Vulnerabilities | Reflectiz

Originally published by Reflectiz. Reflectiz will explore the nature of open source vulnerabilities, the risks they pose, and how organizations...
Read More

Companies in Asia need to take Ransomware More Seriously

With the start of 2023, companies in Asia are put at higher risk of being hit with ransomware attacks. Over...
Read More

What is CTEM? A Complete Overview | Reflectiz

Originally published by Reflectiz. Gartner coined the term Continuous Threat Exposure Management (CTEM). “By 2026, organizations prioritizing their security investments...
Read More

5 Unexpected Ways to Reduce Your Attack Surface | Reflectiz

Originally published by Reflectiz. There are many actionable strategies to reduce your attack surface and make it more manageable. This...
Read More

6 Essentials for Foolproof Source Code Security | Reflectiz

Originally published by Reflectiz. To prevent the consequences of weak source code, foolproof source code security is the goal, and...
Read More

Get Started with Our Leading EASM Solutions

Comprehensive Visibility of your Attack Surface

Refining Threat Intelligence with more rapid response

Streamlined Risk Management with Prioritized Vulnerabilities

Improved Compliance with Internal & External Regulatory Bodies

Contact Us Today!

Privacy Policy Company Overview

COMPANY

Our Location Career with LOGON Our Partners

SERVICES

Training Services Implementation Services Pre-Sales and Post-Sales Services Best Practices Consulting

GET IN TOUCH

Phone:
Hong Kong: +852 2512 8491
India: +91 70220 22744 / +91 63668 26133
Email: [email protected] ©2025 LOGON International Ltd. All rights reserved
logon logo WHITE Image Image Image

Search engine

Use this form to find things you need on this site

More results...

Fill in the form below
  • This field is for validation purposes and should be left unchanged.
  • This field is hidden when viewing the form
  • This field is hidden when viewing the form

Watch On-demand Webinar

  • This field is for validation purposes and should be left unchanged.

Get Your Free UserLock Trial

  • This field is for validation purposes and should be left unchanged.

Download Your Free Trial 10-Day Trial Today

  • Downloading and evaluating Smart Package Studio is quick and easy
  • Includes a short introductory guide that suggests smart features to try
  • Access the full functionality of Smart Package Studio during the trial
  • This field is for validation purposes and should be left unchanged.

Request for Priority Support with our support team

  • This field is for validation purposes and should be left unchanged.
  • Drop files here or
    Max. file size: 30 MB.

    Get Free Assessment of your Web Asset

    Request a free non-intrusive security assessment of your website. Get a report with an overview of client-side security risks.

    • This field is for validation purposes and should be left unchanged.
    • This field is hidden when viewing the form

    Recommend a Topic

    • This field is for validation purposes and should be left unchanged.

    Partner with Us on the next episode

    • This field is for validation purposes and should be left unchanged.

    Request Quote for Lansweeper

    Oops! We could not locate your form.

    Advertisement

    Watch On-demand Webinar

    • This field is for validation purposes and should be left unchanged.
    Start PreCrime Network for Free

    Oops! We could not locate your form.

    Advertisement

    Book a Free Demo Today

    Get Your Free Trial

    Oops! We could not locate your form.

    Advertisement
    Get Your Free Trial
    • This field is for validation purposes and should be left unchanged.
    • This field is hidden when viewing the form
    • This field is hidden when viewing the form
    Request for Training Quote

    Oops! We could not locate your form.

    Advertisement
    Request for Training Quote

    Oops! We could not locate your form.

    Advertisement
    Request for Training Quote

    Oops! We could not locate your form.

    Advertisement
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • This field is hidden when viewing the form
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • This field is hidden when viewing the form
    Request for Training Quote
    • Please enter a number from 1 to 20.
    • DD slash MM slash YYYY
    • Image
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • DD slash MM slash YYYY
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • DD slash MM slash YYYY
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • This field is hidden when viewing the form
    Advertisement