Attack Surface Dashboard

GlobalTech Corp  ·  Live — updated 2 minutes ago

Total Known Assets
3,847
+89 this week
Candidate Assets
412
34 unreviewed
Critical Findings Open
23
+5 since yesterday
Exposures — No Owner
67
Needs assignment
Brand Abuse Incidents
14
+3 new incidents
New Assets (7d)
89
Across 3 groups
Mean Time to Triage
4.2h
↓ Improved 18%
Mean Time to Remediate
18.3d
↑ Up from 15.1d
High-risk Vendors
5
2 critical tier
High-risk Subsidiaries
2
AsiaFinance: 76
AI Executive Summary AI Generated

Your attack surface increased 12% this week, driven by 3 new cloud services in Subsidiary B and 2 unpatched TLS certs on legacy infra. Most urgent: the exposed admin portal on api-internal.globaltech.io shares SSO with 47 internal services including crown jewel financial DBs.

Risk vs last week↑ HIGH
Exposure Trend
Asset State Distribution
Approved 2,341
Candidate 412
Dependency 756
Investigate 338
Top Risk Domains
Ownership Gap Action needed
Third-party & Subsidiary
Brand & Domain Watch14
Recent Exposure Drift
SLA & Ticket Health

Discovery

Manage discovery groups, seeds, exclusions, and scan schedules

Discovery Groups
Seeds
Exclusions
Run History
Coverage Insights

Inventory

3,847 assets · Search-first external attack surface view

Filters
Asset NameTypeStateScore FindingsOwnerBULast Seen ReachableActions
Showing 50 of 3,847

Findings

Triage, investigate, and remediate security findings across your attack surface

Open 89
Triaged 34
In Progress 21
Fixed 145
Accepted Risk 12
${LANG==='ko'?'오탐':'False Positive'} 8
PrioritySeverityFindingAsset Business ImpactOwnerFirst SeenSLATicketActions

Asset Health Monitoring

Certificate expiry, connectivity, and configuration drift across your attack surface

Asset Growth Over Time
State Distribution Trend
Expiring Certificates — Next 60 Days

Exposure Drift

Detect unexpected changes in your external attack surface

Drift Summary
Change Timeline

Brand & Domain Watch

Monitor brand impersonation, typosquatting, and phishing infrastructure

Typosquat Candidates
8
3 with active MX
Suspicious MX Records
3
Phishing infrastructure
Cloned Site Indicators
2
Visual clone detected
Fake App References
1
App store listing

Third-party Risk Monitoring

Track supply chain exposure through your vendor ecosystem

Subsidiary Watch

Organization, subsidiary, vendor and threat actor relationship map

Cloud Exposure

Misconfigured cloud resources and public exposure risks

Exposed Buckets
3
Public Endpoints
14
Shadow Cloud Apps
7
Unauthenticated Services
2

Credential & Secret Exposure

Leaked credentials and secrets found in public repositories and dark web

Certificate & TLS Monitoring

Certificate validity, TLS configuration issues, and expiration tracking

DNS Hygiene

DNS misconfigurations, dangling records, and zone transfer risks

Attack Paths & Entity Graph

Visualize asset relationships, attack paths, and business impact context

Critical Finding
Domain/Host
Organization
Subsidiary
Vendor
AI Path Analysis

Critical path: An internet-exposed subdomain on api-internal.globaltech.io links to corporate SSO, granting access to 47 internal services including crown jewel financial databases. Path confidence: 92%

Critical Attack Paths
Shortest Path to Crown Jewels
Internet → api-internal.globaltech.ioSSOdb-prod
3 hops · Exploitability: Very High

Entities

Organizations, subsidiaries, vendors, cloud accounts, and their relationships

Reports

Generate operational and executive intelligence reports

Report Templates
Recent Reports

Integrations

Connect StealthMole ASM with your security and operations toolchain

Connected
5
Available
7
Ticketing & Workflow
Notifications
SIEM / Security
Cloud & Code

Users & Roles

Manage team members, roles, and access scopes

Business Units

Define organizational units and map ownership

Subsidiaries

Manage subsidiary entities, visibility rules, and risk inheritance

Vendors

Manage vendor relationships and third-party monitoring scope

Policies

Define automated detection, escalation, and notification policies

Notifications

Configure alert channels, rule-based routing, and escalation paths

Audit Logs

Immutable record of all sensitive actions and state changes

TimestampActorActionEntity TypeEntityBefore → AfterIP / Device

Billing & Plan

Invoice History