Attack Surface Management
Your attack surface is every system, port, certificate, and piece of infrastructure an attacker can see from the public internet. This shelf explains the most common exposure types, why they matter, and what to do about them.
About this shelf
External Attack Surface Management (EASM) is the practice of continuously discovering, inventorying, and monitoring everything an organisation exposes to the public internet. The discipline emerged because traditional asset inventories — CMDBs, spreadsheets, agent-based tooling — consistently miss the things that matter most: forgotten subdomains, expired-but-still-resolving DNS records, third-party-hosted infrastructure, and shadow IT spun up outside central IT's view. Attackers do not respect organisational boundaries; they enumerate what is reachable, and that is the real attack surface.
Articles in this shelf cover the recurring exposure categories: open ports and unauthenticated services, certificate hygiene and SSL/TLS misconfigurations, dangling subdomains and DNS takeover risks, outdated and end-of-life web technologies, blacklisted IP space, email authentication gaps (SPF, DKIM, DMARC), API security weaknesses, DDoS exposure, and the passive vulnerability detection patterns that find issues without intrusive scanning. Each book explains what the exposure looks like in the wild, how attackers find it, and what a workable remediation path looks like.
If you are building or running an EASM programme, the order to read is: start with IP and asset discovery, move into the specific exposure categories that match your stack, then read the articles on continuous monitoring and prioritisation. Attack surface work is not a one-off project — it is an ongoing operational practice, and the value compounds when the data feeds into vulnerability management, threat intelligence, and incident response.
Articles in this shelf10 articles
API Security Threats
How modern application architectures put APIs at the centre of the attack surface, what the OWASP API Security Top 10 actually covers, and why traditional WAFs miss API-specific attacks.
9 min read · Updated 2026-04-26Blacklisted IP Addresses
Why IP addresses end up on reputation blocklists, how those listings break mail delivery and outbound traffic, and the practical playbook for monitoring, delisting, and avoiding the problem in the first place.
7 min read · Updated 2026-04-26Cloud Security Misconfigurations
Why cloud misconfigurations have become the dominant cause of public cloud breaches, how they differ from traditional vulnerabilities, and how to find and fix them before attackers do.
8 min read · Updated 2026-04-26Dangling Subdomains and Subdomain Takeover
How abandoned DNS records pointing to deprovisioned cloud resources let attackers claim subdomains under your brand, why this happens constantly, and how to keep DNS hygiene tight.
7 min read · Updated 2026-04-26DDoS Attacks
How distributed denial of service attacks work in 2026, the three main categories, recent record-breaking incidents, and what realistic defence looks like for organisations of any size.
8 min read · Updated 2026-04-26Email Authentication (SPF, DKIM, DMARC, BIMI)
How SPF, DKIM, DMARC and BIMI fit together to stop email spoofing, the alignment rules that actually decide whether a message passes, and the misconfigurations that quietly break authentication on production domains.
8 min read · Updated 2026-04-26External IP Discovery and Open Ports
How external IP and port discovery works, what attackers learn from a basic scan, and how to keep a continuous inventory of your internet-facing assets.
7 min read · Updated 2026-04-26Outdated Web Technologies
Why end-of-life web frameworks, CMS platforms and JavaScript libraries persist on production sites, the CVEs they bring with them, and how to find and replace them before attackers do.
7 min read · Updated 2026-04-26Passive Vulnerability Assessment
How passive vulnerability assessment infers exposures from banners, certificates and other observable data without sending intrusive payloads, and where it fits alongside active testing.
7 min read · Updated 2026-04-26SSL/TLS Misconfigurations
How TLS certificate expiry, weak ciphers, deprecated protocols and chain issues create exploitable exposure, and how continuous monitoring across CT logs and live endpoints keeps your TLS posture healthy.
7 min read · Updated 2026-04-26