SecurityScorecard Snags Driftnet to Level Up Threat Intelligence
Dark ReadingArchived May 15, 2026✓ Full text saved
The acquisition looks to boost visibility into third-party ecosystems, which are becoming a bigger concern as vectors for supply chain attacks.
Full text archived locally
✦ AI Summary· Claude Sonnet
CYBER RISK
News, news analysis, and commentary on the latest trends in cybersecurity technology.
SecurityScorecard Snags Driftnet to Level Up Threat Intelligence
The acquisition looks to boost visibility into third-party ecosystems, which are becoming a bigger concern as vectors for supply chain attacks.
Arielle Waldman,Features Writer,Dark Reading
May 14, 2026
2 Min Read
SecurityScorecard has acquired Driftnet, adding another layer of threat intelligence to its third-party risk management (TPRM) platform.
Driftnet is a UK-based Internet scanning and search engine startup that provides organizations with real-time threat intelligence. Users can search by domain, IP address, or organization to uncover open ports, potential vulnerabilities, misconfigurations, or attack campaigns that may pose a risk to their networks.
Vendor risk management has emerged as a key area in cyber defenses, especially since the pivot to remote work during the COVID-19 pandemic. SecurityScorecard's own research found almost one-third of breaches are third-party-related, and that number is probably both underreported and growing.
Organizations' increasing use of automated tools and agentic artificial intelligence (AI) further complicates third-party risk that can turn into threats and, more concerningly, breaches, SecurityScorecard warns. As risks emerge faster than organizations can handle, security posture audits must evolve to keep pace with advanced attackers and a complex supply chain.
Related:Emerging Chiplet Designs Spark Fresh Cybersecurity Challenges
While automated tools and AI can help boost productivity and efficiency, third parties may be deploying them "across supplier and partner environments with weak access controls, exposed credentials, and no visibility," according to SecurityScorecard.
"The threat landscape has fundamentally changed," states SecurityScorecard CEO and co-founder Aleksandr Yampolskiy. "AI agentic automation and connected supply chain tools have exploded across enterprise environments — and most TPRM programs have no visibility into the risk AI poses for their vendors."
LOADING...
Proactive Breach Detection
With the acquisition, SecurityScorecard aims to put threat hunters, security operations center teams, and TPRM practitioners on the same page for discovering and mitigating third-party risks. That could enable a more "proactive breach detection," the company notes.
SecurityScorecard continues to build up its TPRM platform and respond with automation. In March, the company launched TITAN AI to automate vendor risk workflows. Last year, it bought HyperComply, which puts an automated spin on the tedious task of filling out security questionnaires and responses.
The Driftnet acquisition helps round out SecurityScorecard's offerings with more in-depth threat intelligence. Organizations struggle with network visibility and an overwhelming number of assets as third-party infrastructure and environments are more interwoven than ever. Understanding third-party risk is not only essential to mitigate threats but to adhere to compliance regulations as well.
Related:TransUnion's Real Networks Deal Focuses on Robocall Blocking
Financial terms of the Driftnet transaction were not disclosed. SecurityScorecard's announcement also notes that it will maintain Driftnet's existing collaborations with computer emergency response teams in the US, EU, and UK, as well as partnerships with several universities that have produced academic works on global Internet health.
About the Author
Arielle Waldman
Features Writer, Dark Reading
Arielle spent the last decade working as a reporter, transitioning from human interest stories to covering all things cybersecurity related in 2020. Now, as a features writer for Dark Reading, she delves into the security problems enterprises face daily, hoping to provide context and actionable steps. She looks for stories that go past the initial news to understand where the industry is going. Her coverage areas include identity and access management, cyber risk and operations, industrial control systems, operational technology, and ransomware trends.
She previously lived in Florida where she wrote for the Tampa Bay Times before returning to Boston where her cybersecurity career took off at SearchSecurity. When she's not writing about cybersecurity, she pursues personal projects that include a mystery novel and poetry collection.
Want more Dark Reading stories in your Google search results?
ADD US NOW
More Insights
Industry Reports
How Enterprises Are Developing Secure Applications
Inside RSAC 2026: security leaders reveal the risks redefining your defense strategy
How Enterprises Are Harnessing Emerging Technologies in Cybersecurity
Ditch the Data Center: Understanding Flexible Cloud Infrastructure Security Management
2025 State of Malware
Access More Research
Webinars
Your Guide to Securing AI Adoption in Your Organization
What is the Right Role for Identity Threat Detection and Response (ITDR) in Your Organization?
The New Attack Surface: How Attackers Are Exploiting OAuth to Own Your Cloud Workspace
Prompt Injection Is Just the Start: Securing LLMs in AI Systems
Anatomy of a Data Breach: What to Do if it Happens to You
More Webinars
You May Also Like
CYBER RISK
How Can CISOs Respond to Ransomware Getting More Violent?
by James Doggett
JAN 28, 2026
CYBER RISK
US Cyber Pros Plead Guilty Over BlackCat Ransomware Activity
by Alexander Culafi
JAN 05, 2026
CYBER RISK
Switching to Offense: US Makes Cyber Strategy Changes
by Robert Lemos, Contributing Writer
NOV 21, 2025
CYBER RISK
Microsoft Exchange 'Under Imminent Threat,' Act Now
by Arielle Waldman
NOV 12, 2025
Latest Articles in DR Technology
VULNERABILITIES & THREATS
Why Security Leadership Makes or Breaks a Pen Test
MAY 5, 2026
IDENTITY & ACCESS MANAGEMENT SECURITY
Oracle Red Bull Racing Team Revs Up Automation to Boost Security
APR 30, 2026
VULNERABILITIES & THREATS
Bad Memories Still Haunt AI Agents
APR 23, 2026
ENDPOINT SECURITY
Two-Factor Authentication Breaks Free From the Desktop
APR 16, 2026
Read More DR Technology
LOADING...