All shelves
Six topic areas covering the threats, exposures, and operational concepts that come up most often in real security work.
How the shelves are organised
The ScruteX Knowledge Base is divided into six shelves that mirror how mature security teams actually split their work. Each shelf is a self-contained body of articles covering one operational area, and each article inside it is written to stand on its own — you should be able to read any single book without needing to read everything else first.
Attack Surface Management covers everything visible to the public internet: exposed services, certificates, dangling subdomains, outdated web technologies, and the discovery techniques that turn a sprawling, poorly-tracked estate into a monitored inventory. Data Exposure and the Dark Web covers the lifecycle of leaked data — how stealer logs are produced, how breached credentials end up on Telegram, how source code leaks happen, and where defenders should be looking. Brand Protection covers impersonation: typosquatting, homograph domains, fake mobile apps, and imposter social profiles, with practical notes on how takedowns actually get done.
Threat Intelligence covers the actor side: who is targeting whom, how zero-days move through disclosure and exploitation, how initial access brokers monetise their work, and the AI/LLM-specific risks that have emerged in the last two years. Vendor & Supply Chain covers third-party risk: SBOM, SCA, software supply chain attacks like SolarWinds and 3CX, and the regulatory pressure (DORA, NIS2, SOCI) that is reshaping vendor due diligence. Security Operations covers how all of the above gets run as a programme: CTEM, threat hunting, incident response, MITRE ATT&CK mapping, and risk scoring approaches that move beyond raw CVSS.
Articles cross-link between shelves wherever it makes sense, and the glossary sits alongside as a quick-reference for acronyms and recurring terminology. If you are not sure where to start, the shelves below show how many articles each currently contains.
Attack Surface Management
Your attack surface is every system, port, certificate, and piece of infrastructure an attacker can see from the public internet. This shelf explains the most common exposure types, why they matter, and what to do about them.
Browse 10 articlesData Exposure and the Dark Web
Credentials, sessions, source code, and personal data leak from breaches and misconfigurations every day. This shelf covers the dark web ecosystem, how data leakage actually happens, and the practical steps to detect and respond to it.
Browse 9 articlesBrand Protection
Attackers register typosquats, build fake mobile apps, and create imposter social profiles to defraud your customers and steal credentials. This shelf explains how impersonation attacks work, how to detect them early, and how takedowns get done in practice.
Browse 4 articlesThreat Intelligence
Threat intelligence turns raw signals into useful context about adversaries. This shelf covers threat actor types, the ransomware ecosystem, vulnerability lifecycles, and how to make IOCs actually useful for your security operations.
Browse 4 articlesVendor and Supply Chain Risk
Most modern breaches come through vendors. This shelf explains third party risk fundamentals, how security questionnaires work in practice, and what continuous vendor monitoring actually means.
Browse 0 articlesSecurity Operations
The day to day work of running a security programme. This shelf covers risk scoring frameworks, patch management, the difference between red teaming and pen testing, and how to structure incident response.
Browse 6 articlesHuman and Identity Threats
Most attacks today land through people and credentials, not through unpatched servers. This shelf covers the human-side attack vectors (phishing, BEC, social engineering, insider threats) and the access controls that defend against them (IAM, PAM, identity threat detection).
Browse 7 articles