External Attack Surface Management (EASM) and Digital Risk Protection (DRP) for Continuous Security Monitoring
Summary
Hide ▲
Show ▼
External Attack Surface Management (EASM) and Digital Risk Protection (DRP) tools are essential for maintaining the security of an organization's external-facing IT infrastructure. These tools automate the discovery and monitoring of internet-exposed assets, ensuring that only authorized access points remain open and that orphaned services are de-provisioned. They also monitor external threats across various channels, providing immediate alerts when potential risks are detected. EASM focuses on identifying forgotten or misconfigured assets, while DRP scans external channels for threats such as leaked credentials or impersonation attempts. Together, they help organizations build systematic security rituals, quantify improvements, and integrate insights into existing workflows. This proactive approach prevents the accumulation of risk and ensures continuous monitoring of the digital footprint.
Timeline
-
14.08.2025 14:25 1 articles · 1mo ago
EASM and DRP Tools Automate Continuous Security Monitoring
EASM and DRP tools are essential for maintaining the security of an organization's external-facing IT infrastructure. These tools automate the discovery and monitoring of internet-exposed assets, ensuring that only authorized access points remain open and that orphaned services are de-provisioned. They also monitor external threats across various channels, providing immediate alerts when potential risks are detected. EASM focuses on identifying forgotten or misconfigured assets, while DRP scans external channels for threats such as leaked credentials or impersonation attempts. Together, they help organizations build systematic security rituals, quantify improvements, and integrate insights into existing workflows. This proactive approach prevents the accumulation of risk and ensures continuous monitoring of the digital footprint.
Show sources
- Have You Turned Off Your Virtual Oven? — thehackernews.com — 14.08.2025 14:25
Information Snippets
-
EASM tools continuously map internet-facing assets, discovering resources that may have been forgotten.
First reported: 14.08.2025 14:251 source, 1 articleShow sources
- Have You Turned Off Your Virtual Oven? — thehackernews.com — 14.08.2025 14:25
-
DRP platforms scan external channels like social media, underground forums, and data leak sites for mentions of the organization.
First reported: 14.08.2025 14:251 source, 1 articleShow sources
- Have You Turned Off Your Virtual Oven? — thehackernews.com — 14.08.2025 14:25
-
EASM and DRP tools help automate the discovery and monitoring of internet-exposed assets, ensuring that only authorized access points remain open.
First reported: 14.08.2025 14:251 source, 1 articleShow sources
- Have You Turned Off Your Virtual Oven? — thehackernews.com — 14.08.2025 14:25
-
EASM identifies orphaned assets such as forgotten development servers, open ports, and subdomains pointing to decommissioned services.
First reported: 14.08.2025 14:251 source, 1 articleShow sources
- Have You Turned Off Your Virtual Oven? — thehackernews.com — 14.08.2025 14:25
-
DRP provides immediate alerts when threats are detected, such as leaked credentials or impersonation attempts.
First reported: 14.08.2025 14:251 source, 1 articleShow sources
- Have You Turned Off Your Virtual Oven? — thehackernews.com — 14.08.2025 14:25
-
Regular scan summaries help surface newly discovered assets, configuration changes, and potential risks.
First reported: 14.08.2025 14:251 source, 1 articleShow sources
- Have You Turned Off Your Virtual Oven? — thehackernews.com — 14.08.2025 14:25
-
Integrating EASM and DRP insights into existing workflows ensures continuous validation of the external footprint and configuration parameters.
First reported: 14.08.2025 14:251 source, 1 articleShow sources
- Have You Turned Off Your Virtual Oven? — thehackernews.com — 14.08.2025 14:25
-
Automated alerts and customizable workflows prioritize attention on the most critical issues, reducing false positives.
First reported: 14.08.2025 14:251 source, 1 articleShow sources
- Have You Turned Off Your Virtual Oven? — thehackernews.com — 14.08.2025 14:25
Similar Happenings
GitHub Strengthens npm Supply Chain Security with 2FA and Short-Lived Tokens
GitHub is implementing enhanced security measures to protect the npm ecosystem, including mandatory two-factor authentication (2FA) and short-lived tokens. These changes aim to mitigate supply chain attacks, such as the recent "s1ngularity", "GhostAction", and "Shai-Hulud" attacks, which involved a self-replicating worm and compromised thousands of accounts and private repositories. The measures include granular tokens with a seven-day expiration, trusted publishing using OpenID Connect (OIDC), and automatic generation of provenance attestations for packages. Additionally, GitHub is deprecating legacy tokens and TOTP 2FA, expanding trusted publishing options, and gradually rolling out these changes to minimize disruption. GitHub removed over 500 compromised packages and blocked new packages containing the Shai-Hulud malware's indicators of compromise. The company encourages NPM maintainers to use NPM-trusted publishing and strengthen publishing settings to require 2FA. Ruby Central is also tightening governance of the RubyGems package manager to improve supply-chain protections.
Chinese State-Sponsored Actors Target Global Critical Infrastructure
Chinese state-sponsored Advanced Persistent Threat (APT) actors, specifically the Salt Typhoon group and a newly identified group named RedNovember, have been conducting sustained campaigns to compromise critical infrastructure networks worldwide. The campaigns aim to gain long-term access to telecommunications, government, transportation, lodging, and military networks. This activity has been detailed in a joint advisory by CISA, NSA, FBI, and international partners, including Canada, Australia, New Zealand, the UK, Czech Republic, Finland, Germany, Italy, Japan, the Netherlands, Poland, and Spain. The advisory provides intelligence on tactics used by these actors and recommends mitigations to strengthen defenses. The Czech Republic's National Cyber and Information Security Agency (NUKIB) has issued a warning instructing critical infrastructure organizations to avoid using Chinese technology or transferring user data to servers located in China. The agency has re-evaluated its risk estimate of significant disruptions caused by China, now assessing it at a 'High' level. The NUKIB has confirmed malicious activities of Chinese cyber-actors targeting the Czech Republic, including a recent APT31 campaign targeting the Czech Ministry of Foreign Affairs. The advisory highlights concerns over the transfer of system and user data to China, potentially misused by state, military, or political interests. The Czech government previously accused China of targeting its critical infrastructure through APT 31, an allegation denied by the PRC but condemned by the US, EU, and NATO. The advisory suggests that individuals and organizations consider restricting or prohibiting the use of products and services that transfer data to China. The campaign has targeted at least 600 organizations across 80 countries, including 200 in the U.S. The threat actors have exploited vulnerabilities in Cisco, Ivanti, and Palo Alto Networks devices to gain initial access and have modified routers to maintain persistent access and pivot into other networks. The advisory also notes that the APT actors may target other devices such as Fortinet firewalls, Juniper firewalls, Microsoft Exchange, Nokia routers and switches, Sierra Wireless devices, Sonicwall firewalls, etc. RedNovember has targeted perimeter appliances of high-profile organizations globally, including defense and aerospace organizations, space organizations, and law firms. The group has breached at least two U.S. defense contractors, a European engine manufacturer, and a trade-focused intergovernmental cooperation body in Southeast Asia. RedNovember has used the Go-based backdoor Pantegana and Cobalt Strike as part of its intrusions, along with the Spark RAT and LESLIELOADER. The group has also used VPN services like ExpressVPN and Warp VPN to administer and connect to servers used for exploitation and communication.
Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data
The threat actor, tracked as UNC6395 by Google and GRUB1 by Cloudflare, exploited OAuth tokens associated with the Drift AI chat agent to breach Salesloft and steal data from Salesforce customer instances. The campaign, active from August 8 to at least August 18, 2025, targeted over 700 organizations, including Workiva and Stellantis, and impacted all integrations connected to the Drift platform, not just Salesforce. The attackers exported large volumes of data, including credentials for AWS, passwords, and Snowflake access tokens. Zscaler, Palo Alto Networks, Cloudflare, and Workiva reported data breaches after threat actors accessed their Salesforce instances via compromised Salesloft Drift credentials, exposing customer information. The breach began with the compromise of Salesloft's GitHub account, accessed by UNC6395 from March to June 2025. The threat actor accessed multiple repositories, added a guest user, and established workflows. Reconnaissance activities occurred in the Salesloft and Drift application environments between March and June 2025. The attackers accessed Drift's AWS environment and obtained OAuth tokens for Drift customers' technology integrations. Salesloft isolated the Drift infrastructure, application, and code, and took the application offline on September 5, 2025. Salesloft rotated credentials in the Salesloft environment and hardened it with improved segmentation controls. Salesloft recommends that all third-party applications integrated with Drift via API key revoke the existing key. Salesforce restored the integration with the Salesloft platform on September 7, 2025, except for the Drift app, which remains disabled. Salesloft and Salesforce have taken steps to mitigate the breach, including revoking tokens and removing the Drift application from AppExchange. The breach highlights the risks associated with third-party integrations and the potential for supply chain attacks. UNC6395 demonstrated operational discipline, querying and exporting data methodically, and attempting to cover their tracks by deleting query jobs. The targeted organizations included security and technology companies, suggesting a broader strategy to infiltrate vendors and service providers. The campaign is limited to Salesloft customers who integrate their own solutions with the Salesforce service. There is no evidence that the breaches directly impacted Google Cloud customers, though any of them that use Salesloft Drift should review their Salesforce objects for any Google Cloud Platform service account keys. The threat group ShinyHunters and Scattered Spider claimed responsibility for many of those attacks, and vishing attacks have been cited as the means of compromise. Google disclosed that UNC6040 breached one of its Salesforce instances using these tactics. The UNC6395 Salesloft Drift activity is separate from the vishing attacks attributed to UNC6040. Okta successfully defended against a potential breach by enforcing inbound IP restrictions, securing tokens with DPoP, and using the IPSIE framework. Okta recommends that organizations demand IPSIE integration from application vendors and implement an identity security fabric. Palo Alto Networks' Unit 42 advised organizations to conduct immediate log reviews for signs of compromise and rotate exposed credentials. Okta suggests reducing the blast radius of a single entity breach by constraining token use by IP and client and ensuring granular permissions for M2M integrations. The FBI has issued a FLASH alert warning that two threat clusters, tracked as UNC6040 and UNC6395, are compromising organizations' Salesforce environments to steal data and extort victims. UNC6040 is a threat actor that specializes in voice phishing or vishing and recently was observed using social engineering to pose as IT support staff to get into Salesforce environments. UNC6395 is best known for using stolen OAuth tokens from Salesloft's Drift application, which has a Salesforce integration, to steal sensitive data from hundreds of Salesforce environments earlier this year. The FBI's latest advisory provides additional context into the technical aspects of the threat campaigns, particularly UNC6040's activity, which began last fall. The advisory also includes indicators of compromise, including IP addresses and URLs associated with the two campaigns.
SIEM Detection Failures Highlighted in Picus Blue Report 2025
The Picus Blue Report 2025, based on over 160 million attack simulations, reveals that organizations detect only 1 out of 7 simulated attacks. This indicates significant gaps in threat detection and response capabilities, primarily due to log collection failures, misconfigured detection rules, and performance issues. These failures leave networks vulnerable to compromise, escalation of privileges, and data exfiltration. The report identifies key issues such as log source coalescing, unavailable log sources, and inefficient filtering as major contributors to SIEM rule failures. Continuous validation of SIEM rules is essential to maintain effectiveness against evolving threats. The report also shows that prevention dropped from 69% to 62% in one year, and that 54% of attacker behaviors generated no logs, making entire attack chains unfold with zero visibility. Only 14% of attacker behaviors triggered alerts, and data exfiltration was stopped just 3% of the time, leaving a critical stage effectively unprotected. The report highlights the need for Breach and Attack Simulation (BAS) to validate security defenses continuously.
Murky Panda, Genesis Panda, Glacial Panda Cloud and Telecom Intrusions
Chinese hacking groups Murky Panda, Genesis Panda, and Glacial Panda have escalated their cloud and telecom espionage activities. Murky Panda, also known as Silk Typhoon, exploits trusted cloud relationships and zero-day vulnerabilities to breach enterprise networks. They target government, technology, academic, legal, and professional services entities in North America. Murky Panda exploits internet-facing appliances and known security flaws in Citrix, Commvault, and Ivanti Pulse Connect VPN to deploy web shells and custom malware. They compromise exposed SOHO devices and deploy web shells to establish persistence. In recent attacks, Murky Panda exploited zero-day vulnerabilities to break into a SaaS provider's cloud environment and gain access to the provider's application registration secret in Entra ID. They also compromised a Microsoft cloud solution provider with delegated administrative privileges (DAP) to gain Global Administrator rights across all downstream tenants. Genesis Panda, active since January 2024, targets financial, media, telecommunications, and technology sectors across 11 countries. They leverage cloud services for exfiltration and persistence. Glacial Panda targets telecoms in 12 countries, exploiting Linux systems and legacy technologies. They use privilege escalation bugs and trojanized OpenSSH components for backdoor access.