We are excited to announce the availability of Google Cloud Security Customer Success subscriptions. Optimize ...
Previously, when performing API calls to capture entities (/v1/search/entities/), there were two filters which...
For the best results using Mandiant Attack Surface Management, add the following IP addresses to your allowlis...
If you have a collection where you expect not to find a specific technology you can create a technology policy...
In order to change the severity of an issue for a collection you can go to the collection settings and under i...
After an Issue has been seen in a scan it will show in the collection settings. Only after that, an Issue can ...
For Collections configured with high number of seeds and resulting in many entities, there will be a big numbe...
By default, Mandiant ASM (Attack Surface Management) has a focused approach to identifying assets for testing....
In this brief post, we'll take a closer look at the Library in Attack Surface Management (ASM). In ASM you hav...
This guide will use Python to connect to ASM via API to create and/or delete. The script will contain a menu w...
The following two examples can be used as a reference for basic calls to the ASM API. In both examples, the ke...
I'd like to know if ASM SaaS is vulnerable to the following critical vulnerabilities(specifically, if ASM util...
We are excited to announce the availability of Google Cloud Security Customer Success subscriptions. Optimize ...
We have a webinar, Living on the Edge: Investigating Ivanti Connect Secure VPN Zero-Day Exploits coming up thi...
Is there a good explanation why some inferred CVEs come without a reference to (MA)TI Threat Intelligence when...
Mandiant Attack Surface Management 30-day free trial https://www.mandiant.com/attack-surface-management-free-t...