Blog
  • Home
  • Login
  • Try It
Exploring the risks of subdomain takeovers

Exploring the risks of subdomain takeovers

Risks & Vulnerabilities • 5 min read
Digital skimmers: what they are, how they work, and how to stay protected against them

Digital skimmers: what they are, how they work, and how to stay protected against them

Risks & Vulnerabilities • 4 min read
Why we're moving away from passwords

Why we're moving away from passwords

Announcements • 2 min read
Why external vulnerability scanning is no longer sufficient on its own

Why external vulnerability scanning is no longer sufficient on its own

Attack Surface Management • 7 min read
It’s Turtles All The Way Down

It’s Turtles All The Way Down

Attack Surface Management • External
Best practices for applying Halo Security's security testing and monitoring services to your assets

Best practices for applying Halo Security's security testing and monitoring services to your assets

Attack Surface Management • 3 min read
3 ways undiscovered cloud assets put your organization at risk

3 ways undiscovered cloud assets put your organization at risk

Attack Surface Management • 2 min read
Attack Surface Management 101: Everything you need to know about the latest approach to external security

Attack Surface Management 101: Everything you need to know about the latest approach to external security

Attack Surface Management • 6 min read
Introducing Halo Security

Introducing Halo Security

Announcements • 1 min read
← Newer Posts
Platform
  • Home
  • Overview
  • Customers
  • Integrations
  • Resources
  • Plans & Pricing
Features
  • Discovery
  • Firewall Scanning
  • Website Scanning
  • Technology Scanning
  • Server Scanning
  • Application Scanning
  • Dark Web Monitoring
  • Compliance Reporting
  • Security Review
Use Cases
  • Attack Surface Inventory
  • External Vulnerability Management
  • Monitor Subsidiary Risk
  • Evaluate Mergers & Acquisitions
  • Assess Security Program Effectiveness
  • Prevent Subdomain Takeovers
  • Achieve PCI Compliance
Solutions
  • Monitor Certificates
  • Monitor Cookies
  • Monitor Headers
  • Monitor Forms
  • Monitor JavaScript
  • Monitor Downloads
Penetration Testing
  • Pentest Overview
  • Scope a Pentest
Pentest Types
  • Web Application
  • Mobile Application
  • API
  • External Network
  • Internal Network
  • Wireless
  • Compliance
  • Social Engineering
  • Red Teaming
Community
  • Docs
  • Support
  • Blog
  • Site Scan
Company
  • About Us
  • News
  • Partner List
  • Become a Partner
  • Terms
  • Privacy
  • Consent Preferences
  • System Status
  • Trust Center
  • Contact
© 2026 Halo Security