Security Research & Blog
Threat intelligence, practical guides, and case studies from the ScruteX research team.
Most Read
CVE Radar: Critical Vulnerabilities to Patch This Week (May 6, 2026)
Instructure Canvas LMS Breach: 275M Students Exposed by ShinyHunters
Latest Posts
Instructure Canvas LMS Breach: 275M Students Exposed by ShinyHunters
CVE Radar: Critical Vulnerabilities to Patch This Week (May 6, 2026)
Ransomware Weekly: Top Groups and Trends, Week of May 4, 2026
More articles 25 posts
What is CTEM? The Complete Guide to Continuous Threat Exposure Management
CTEM is a security framework developed by Gartner that shifts organisations from reacting to breaches to continuously finding, prioritising, and eliminating exposures before attackers exploit them. This guide explains what it is, why it matters, and how to implement it.
How to Find Leaked Credentials on the Dark Web: A Practical Guide
Compromised credentials are responsible for 41% of data breaches. This guide explains where leaked credentials end up, how attackers use them, and how to monitor for your organisation's exposure before that window closes.
Why Monthly Security Reports Beat Annual Audits: A Guide for Security Leaders
Annual security audits tell you what your risk posture was 12 months ago. Monthly security reports tell you what it is today. This guide explains why cadence is one of the most underrated variables in security management.
What is Typosquatting? How Attackers Use Fake Domains, and How to Stop Them
Typosquatting is the registration of domains that closely resemble legitimate websites, designed to catch people who mistype a URL or click a convincing link. Here is how it works and what you can do about it.
Scrutex vs UpGuard: An Honest Comparison for Security Teams
UpGuard and Scrutex CyberInsights both address external risk management, but they approach it from different angles. This comparison lays out exactly what each tool does, where each falls short, and which is the better fit for different organisational needs.
What Continuous Monitoring Catches That Monthly Scans Miss
Monthly security scans are categorically better than quarterly or annual ones. Real-time continuous monitoring is categorically different from monthly scans. This post covers the specific risks that live in the gap between your monthly reports.
Vendor Security Assessment Template: A Complete Framework (Free Download)
Third-party breaches account for the majority of significant data incidents. This guide provides a complete vendor security assessment framework with a downloadable template covering seven control domains.
How to Present Security Risk to a Non-Technical Board: A Practical Guide for CISOs
Board members are not technical. Your job as a security leader is to translate technical risk into business risk, in a format that enables governance decisions. This guide explains how to do that, with a one-page board security summary template.
You're the Only Security Person at Your Company. Here's Your 90-Day Plan.
Being the sole security person at a growing company is one of the most overwhelming jobs in technology. This 90-day framework shows you exactly where to start, what to prioritise, and how to make your programme visible to leadership.
How to Read a Security Scan Result When You're Not a Security Expert
You ran your first external security scan and now you're staring at hundreds of findings. This plain-English guide explains severity ratings, CVSS scores, false positives, and how to decide which findings to fix first.
Cyber Insurance and Your External Attack Surface: What Underwriters Are Actually Checking
Cyber insurance premiums have risen 50 to 300% over the past three years. Underwriters now actively scan your external attack surface before quoting. Here is what they look for and how external risk monitoring directly affects your coverage and premium.
The Hidden Cost of Employee Churn: Why Offboarding Is a Security Event
When an employee leaves, the HR process ends but the security risk does not. Credentials persist, API keys outlast employment contracts, and the average stolen credential sits idle for 41 days before being used.
Your Competitors Can See Your Attack Surface. Can You?
Right now, anyone with a basic security tool and your company's domain name can see your internet-facing infrastructure, exposed services, and leaked credentials. The question is whether you can see it too.
Best CTEM Platforms in 2026: An Honest Comparison for Security Teams
A practical comparison of the leading Continuous Threat Exposure Management platforms in 2026, covering features, pricing, deployment models, and who each platform is best suited for.
External Attack Surface Management Best Practices for 2026
A practical guide to external attack surface management: discovery, prioritisation, remediation, and continuous monitoring workflows that security teams can implement immediately.
How to Detect Brand Impersonation Online: A Practical Guide for Security Teams
Brand impersonation costs organisations millions annually. This guide explains how attackers clone your brand online, and what security teams can do to detect and shut down impersonation campaigns.
RBI Cyber Resilience Guidelines and CTEM: Mapping Your Obligations
A practical guide for Indian BFSI security teams: how the Reserve Bank of India's cyber resilience framework maps to Continuous Threat Exposure Management, and what you need to implement.
Scrutex vs Recorded Future: An Honest Comparison for Security Teams
Comparing Scrutex and Recorded Future across threat intelligence, attack surface management, pricing, and deployment. Two different approaches to external security visibility.
Scrutex vs CrowdStrike Falcon: Different Tools for Different Problems
CrowdStrike Falcon and Scrutex solve fundamentally different security problems. This comparison explains where each platform fits and why many organisations need both.
DORA Compliance Checklist: What Financial Sector Security Managers Need to Know in 2025
DORA compliance checklist for financial sector security managers: the 5 pillars explained, continuous monitoring obligations, and 20 actionable items to close your gaps.
APRA CPS 234 Compliance: What Australian Financial Entities Must Do, and How to Evidence It
APRA CPS 234 compliance guide for Australian financial entities: 7 core requirements, the 6 gaps APRA found in its own audit, and how continuous monitoring builds your evidence trail.
Notable Data Breach Incidents You Need to Know
A roundup of significant data breaches from the past year: what happened, what data was exposed, and what security teams can learn to reduce their own exposure.
How Typosquatting Campaigns Evolved in 2025
Threat actors are registering hundreds of lookalike domains per campaign. Here's what defenders need to know.
CTEM vs Traditional Vulnerability Management: What's the Difference?
Continuous Threat Exposure Management shifts the question from 'are we patched?' to 'are we exposed?'. A crucial distinction.
How a Financial Services Firm Cut Detection Time by 92%
By replacing manual dark web monitoring with Scrutex's automated curation, the team went from weeks to hours.