Skip to content
Free Dark Web Risk Report
Dark Web Academy
News & Press
Government
Law Enforcement
Partners
Contact Us
Products
Assetnote: Attack surface management
Attack Surface Management
Asset discovery
Exposure management
Offensive security research
ASM use cases
Cerberus:
Dark Web Investigation
Dark Web Investigation
Ransomware Search
Marketplace Search
Stealth Browser
Child Protection Tools
AI-Powered Translation
DarkIQ:
Dark Web Monitoring
Dark Web Monitoring
Dark Web Traffic Monitoring
Phishing and Takedown Services
Supply Chain Security
Integrations
Dark Web Data API and Integrations
Solutions
Use Cases
Criminal Investigation
Cyber Threat Intelligence
Ransomware
Security Operations
Supply Chain
Threat Hunting
Industries
Energy
Financial Services
Government
Law Enforcement
Why Searchlight Cyber
Company
About us
Careers
Leadership Team
Resources
Insights
Beacon Newsletter
Blog
Case Studies
Datasheets
Events
Webinars
Whitepapers & Reports
Videos
Podcasts
Knowledge Base
Assetnote Security Research Center
Dark Web Hub
Glossary
FAQs
Book a demo
Products
Assetnote: Attack surface management
Attack Surface Management
Asset discovery
Exposure management
Offensive security research
ASM use cases
Cerberus:
Dark Web Investigation
Dark Web Investigation
Ransomware Search
Marketplace Search
Stealth Browser
Child Protection Tools
AI-Powered Translation
DarkIQ:
Dark Web Monitoring
Dark Web Monitoring
Dark Web Traffic Monitoring
Phishing and Takedown Services
Supply Chain Security
Integrations
Dark Web Data API and Integrations
Solutions
Use Cases
Criminal Investigation
Cyber Threat Intelligence
Ransomware
Security Operations
Supply Chain
Threat Hunting
Industries
Energy
Financial Services
Government
Law Enforcement
Why Searchlight Cyber
Company
About us
Careers
Leadership Team
Resources
Insights
Beacon Newsletter
Blog
Case Studies
Datasheets
Events
Webinars
Whitepapers & Reports
Videos
Podcasts
Knowledge Base
Assetnote Security Research Center
Dark Web Hub
Glossary
FAQs
Book a demo
Free Dark Web Risk Report
Dark Web Academy
News & Press
Government
Law Enforcement
Partners
Contact Us
Connect with us
Loose Types Sink Ships: Pre-Authentication SQL Injection in Halo ITSM
Assetnote Security Research Center
The Latest Research and Resources From The Assetnote Vulnerability Research Team.
All
Security research
Videos
All
Security research
Videos
Recent Security research
Security research
Doing the Due Diligence: Analyzing the Next.js Middleware Bypass (CVE-2025-29927)
Find out more
Security research
Sitecore: Unsafe Deserialisation Again! (CVE-2025-27218)
Find out more
Security research
Nginx/Apache Path Confusion to Auth Bypass in PAN-OS (CVE-2025-0108)
Find out more
Recent Videos
Uncovering Critical Vulnerabilities in Magento: A Deep Dive
Find out more
A Deep Dive into Three ServiceNow Vulnerabilities
Find out more
Chaining Three Bugs to Access All Your ServiceNow Data (Live Q&A)
Find out more