CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 15, 2026

SecurityScorecard Snags Driftnet to Level Up Threat Intelligence

Dark Reading Archived May 15, 2026 ✓ Full text saved

The acquisition looks to boost visibility into third-party ecosystems, which are becoming a bigger concern as vectors for supply chain attacks.

Full text archived locally
✦ AI Summary · Claude Sonnet


    CYBER RISK News, news analysis, and commentary on the latest trends in cybersecurity technology. SecurityScorecard Snags Driftnet to Level Up Threat Intelligence The acquisition looks to boost visibility into third-party ecosystems, which are becoming a bigger concern as vectors for supply chain attacks. Arielle Waldman,Features Writer,Dark Reading May 14, 2026 2 Min Read SecurityScorecard has acquired Driftnet, adding another layer of threat intelligence to its third-party risk management (TPRM) platform.  Driftnet is a UK-based Internet scanning and search engine startup that provides organizations with real-time threat intelligence. Users can search by domain, IP address, or organization to uncover open ports, potential vulnerabilities, misconfigurations, or attack campaigns that may pose a risk to their networks.   Vendor risk management has emerged as a key area in cyber defenses, especially since the pivot to remote work during the COVID-19 pandemic. SecurityScorecard's own research found almost one-third of breaches are third-party-related, and that number is probably both underreported and growing.   Organizations' increasing use of automated tools and agentic artificial intelligence (AI) further complicates third-party risk that can turn into threats and, more concerningly, breaches, SecurityScorecard warns. As risks emerge faster than organizations can handle, security posture audits must evolve to keep pace with advanced attackers and a complex supply chain. Related:Emerging Chiplet Designs Spark Fresh Cybersecurity Challenges While automated tools and AI can help boost productivity and efficiency, third parties may be deploying them "across supplier and partner environments with weak access controls, exposed credentials, and no visibility," according to SecurityScorecard.  "The threat landscape has fundamentally changed," states SecurityScorecard CEO and co-founder Aleksandr Yampolskiy. "AI agentic automation and connected supply chain tools have exploded across enterprise environments — and most TPRM programs have no visibility into the risk AI poses for their vendors."  LOADING... Proactive Breach Detection With the acquisition, SecurityScorecard aims to put threat hunters, security operations center teams, and TPRM practitioners on the same page for discovering and mitigating third-party risks. That could enable a more "proactive breach detection," the company notes.  SecurityScorecard continues to build up its TPRM platform and respond with automation. In March, the company launched TITAN AI to automate vendor risk workflows. Last year, it bought HyperComply, which puts an automated spin on the tedious task of filling out security questionnaires and responses.  The Driftnet acquisition helps round out SecurityScorecard's offerings with more in-depth threat intelligence. Organizations struggle with network visibility and an overwhelming number of assets as third-party infrastructure and environments are more interwoven than ever. Understanding third-party risk is not only essential to mitigate threats but to adhere to compliance regulations as well. Related:TransUnion's Real Networks Deal Focuses on Robocall Blocking Financial terms of the Driftnet transaction were not disclosed. SecurityScorecard's announcement also notes that it will maintain Driftnet's existing collaborations with computer emergency response teams in the US, EU, and UK, as well as partnerships with several universities that have produced academic works on global Internet health. About the Author Arielle Waldman Features Writer, Dark Reading Arielle spent the last decade working as a reporter, transitioning from human interest stories to covering all things cybersecurity related in 2020. Now, as a features writer for Dark Reading, she delves into the security problems enterprises face daily, hoping to provide context and actionable steps. She looks for stories that go past the initial news to understand where the industry is going. Her coverage areas include identity and access management, cyber risk and operations, industrial control systems, operational technology, and ransomware trends.     She previously lived in Florida where she wrote for the Tampa Bay Times before returning to Boston where her cybersecurity career took off at SearchSecurity. When she's not writing about cybersecurity, she pursues personal projects that include a mystery novel and poetry collection.     Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports How Enterprises Are Developing Secure Applications Inside RSAC 2026: security leaders reveal the risks redefining your defense strategy How Enterprises Are Harnessing Emerging Technologies in Cybersecurity Ditch the Data Center: Understanding Flexible Cloud Infrastructure Security Management 2025 State of Malware Access More Research Webinars Your Guide to Securing AI Adoption in Your Organization What is the Right Role for Identity Threat Detection and Response (ITDR) in Your Organization? The New Attack Surface: How Attackers Are Exploiting OAuth to Own Your Cloud Workspace Prompt Injection Is Just the Start: Securing LLMs in AI Systems Anatomy of a Data Breach: What to Do if it Happens to You More Webinars You May Also Like CYBER RISK How Can CISOs Respond to Ransomware Getting More Violent? by James Doggett JAN 28, 2026 CYBER RISK US Cyber Pros Plead Guilty Over BlackCat Ransomware Activity by Alexander Culafi JAN 05, 2026 CYBER RISK Switching to Offense: US Makes Cyber Strategy Changes by Robert Lemos, Contributing Writer NOV 21, 2025 CYBER RISK Microsoft Exchange 'Under Imminent Threat,' Act Now by Arielle Waldman NOV 12, 2025 Latest Articles in DR Technology VULNERABILITIES & THREATS Why Security Leadership Makes or Breaks a Pen Test MAY 5, 2026 IDENTITY & ACCESS MANAGEMENT SECURITY Oracle Red Bull Racing Team Revs Up Automation to Boost Security APR 30, 2026 VULNERABILITIES & THREATS Bad Memories Still Haunt AI Agents APR 23, 2026 ENDPOINT SECURITY Two-Factor Authentication Breaks Free From the Desktop APR 16, 2026 Read More DR Technology LOADING...
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    May 15, 2026
    Archived
    May 15, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗