Blog
  • Home
  • Login
  • Try It
Customize Severities and Automatically Tag Issues with the New Issue Settings

Customize Severities and Automatically Tag Issues with the New Issue Settings

Announcements • 1 min read
Penetration Testing: The Missing Piece in Your Software Development Lifecycle

Penetration Testing: The Missing Piece in Your Software Development Lifecycle

Penetration Testing • 1 min read
A Practical Guide to Planning Your Next Penetration Test in 2025

A Practical Guide to Planning Your Next Penetration Test in 2025

Penetration Testing • 3 min read
Enhanced Login Security: Introducing Passkeys and IP Allowlisting

Enhanced Login Security: Introducing Passkeys and IP Allowlisting

Announcements • 1 min read
Introducing Halo Security’s New Slack Integration for Real-Time Alerts

Introducing Halo Security’s New Slack Integration for Real-Time Alerts

Announcements • 2 min read
Critical regreSSHion Vulnerability Exposes Millions of OpenSSH Servers

Critical regreSSHion Vulnerability Exposes Millions of OpenSSH Servers

Threat Advisories • 1 min read
The Benefits of Ransomware Penetration Testing

The Benefits of Ransomware Penetration Testing

Penetration Testing • 9 min read
Introducing Dark Web Monitoring

Introducing Dark Web Monitoring

Announcements • 2 min read
Easily integrate your Halo Security findings with ArmorCode

Easily integrate your Halo Security findings with ArmorCode

Announcements • 1 min read
More effectively track your dynamic cloud assets with Cloud Connectors

More effectively track your dynamic cloud assets with Cloud Connectors

Announcements • 1 min read
Introducing the new Security Review checklist

Introducing the new Security Review checklist

Announcements • 2 min read
The forgotten first-party risks of third-party platforms

The forgotten first-party risks of third-party platforms

Risks & Vulnerabilities • 2 min read
What are KEVs? Known Exploited Vulnerabilities Explained

What are KEVs? Known Exploited Vulnerabilities Explained

Risks & Vulnerabilities • 2 min read
New Feature: Detect exposed secrets and API keys in JavaScript

New Feature: Detect exposed secrets and API keys in JavaScript

Announcements • 1 min read
Exploring third-party risk: 5 common issues on the modern attack surface

Exploring third-party risk: 5 common issues on the modern attack surface

Attack Surface Management • 3 min read
Crucial Tech Podcast: All Things Data Privacy

Crucial Tech Podcast: All Things Data Privacy

Cybersecurity • 1 min read
← Newer Posts Older Posts →
Platform
  • Home
  • Overview
  • Customers
  • Integrations
  • Resources
  • Plans & Pricing
Features
  • Discovery
  • Firewall Scanning
  • Website Scanning
  • Technology Scanning
  • Server Scanning
  • Application Scanning
  • Dark Web Monitoring
  • Compliance Reporting
  • Security Review
Use Cases
  • Attack Surface Inventory
  • External Vulnerability Management
  • Monitor Subsidiary Risk
  • Evaluate Mergers & Acquisitions
  • Assess Security Program Effectiveness
  • Prevent Subdomain Takeovers
  • Achieve PCI Compliance
Solutions
  • Monitor Certificates
  • Monitor Cookies
  • Monitor Headers
  • Monitor Forms
  • Monitor JavaScript
  • Monitor Downloads
Penetration Testing
  • Pentest Overview
  • Scope a Pentest
Pentest Types
  • Web Application
  • Mobile Application
  • API
  • External Network
  • Internal Network
  • Wireless
  • Compliance
  • Social Engineering
  • Red Teaming
Community
  • Docs
  • Support
  • Blog
  • Site Scan
Company
  • About Us
  • News
  • Partner List
  • Become a Partner
  • Terms
  • Privacy
  • Consent Preferences
  • System Status
  • Trust Center
  • Contact
© 2026 Halo Security