Security Strategies
The Invisible Risk: When Your Attack Surface Changes
Gavin Watson
June 16, 2025
Summary
Even mature businesses with a strong handle on their public facing assets can be caught off guard by change. Exposed ports, misconfigured services, and forgotten systems can appear online without warning — and attackers are always watching. Continuous attack surface monitoring is essential, and without it, you are relying on luck more than defence.

In the world of security, there's a quiet assumption that just because a business has decent maturity, it also has complete visibility. Unfortunately, that’s not always the case — and when it comes to public facing assets, assumptions can be dangerous.

A lot of security teams work hard to understand their organisation’s attack surface. They map out cloud environments, inventory domains, and double-check firewall rules. But while they may know what is exposed today, they often do not know when that exposure changes. And that’s where things can start to go wrong.

The reality is this: change happens all the time.

A developer needs to test something, spins up a server, and ticks the wrong box. Suddenly it is exposed to the world.

A third party managing the firewall makes a small change late on a Friday afternoon — a rule is misconfigured, and RDP is now open to the internet.

Or maybe someone in marketing launches a new microsite with a login portal. Nobody tells security. It is online, unauthenticated, and already indexed.

None of these things are theoretical. They happen all the time. In organisations of every size. In fact, the larger and more mature a business is, the more moving parts it has — and that means more opportunity for exposure.

The kicker? Attackers do not wait. There are automated bots scanning the internet 24/7, looking specifically for exposed services like RDP, MySQL, MongoDB, Elasticsearch and anything else that might provide a foothold. The moment a service appears online, it is noticed. And sometimes, it is attacked within minutes.

So while having a clear inventory of assets is useful, it is not enough. You also need to know when something changes. You need to be alerted when a new service pops up, or when a port that was closed yesterday is open today.

And this goes beyond just open ports. Maybe an application now responds with a different banner. Maybe a security header has been removed. Maybe an expired subdomain is now owned by someone else. These are small details, but they can open the door to very big problems.

This is why continuous monitoring is not a nice to have. It is fundamental to what modern External Attack Surface Management (EASM) should be. You cannot protect what you do not know about, and you cannot act on something if you do not realise it has changed.

Security teams are already stretched. They are dealing with alerts, projects, audits, and everything else. What they need is a way to get meaningful signal — not more noise — about what is changing across their digital estate. Ideally, that signal arrives fast, and with enough context to act.

The goal is not to be paranoid. It is to be prepared.

Gavin Watson

Gavin Watson is an experienced cybersecurity professional with expertise in offensive security, dark web intelligence, and digital risk protection. He began his career as a penetration tester at RandomStorm in 2006, co-founded Pentest People to deliver top-tier security services, and now co-leads DarkInvader. His focus is on helping businesses identify vulnerabilities, monitor the dark web, and mitigate digital risks proactively, ensuring robust protection against evolving cyber threats. Watson's extensive background in cybersecurity drives his commitment to empowering organisations to safeguard their digital assets.

Sign Up for Your Free Account

Unlock continuous, real-time security monitoring with DarkInsight. Sign up for your free account today and start protecting your external attack surface from potential threats.

Create My Free Account