Malicious domains registered in the wake of Hurricane Florence
Hurricane Florence is hitting North and South Carolina, and despite reports of over 20 human lives lost as victims of this horrific reality, we are sadly aware of scammers attempting to exploit the fear and kindness of good people who wish to help and donate to the victims and organizations.
How web software gets hacked — a history of its biggest exploits, and what may be coming in the future
When the Internet was created in the 1960s, it was envisioned as a revolutionary computer network reserved for a couple thousand researchers. There were many resources used in creating this fast and reliable network, and the security measures its developers took into consideration were mostly aimed towards preventing military threats and potential high-power intruders.
Top CVE's exploited in the wild
In previous posts, we’ve explored ways to avoid security issues by hardening DNS servers, and also by following best SSH Security practices. However, today we are not going to show you how to protect against attacks. Instead, we will show you the top 10 most dangerous vulnerabilities exploited in the wild during the current year.
Announcing our SecurityTrails + Phantom app integration
Some time ago we wrote about our SecurityTrails Splunk plugin - and today, we are super excited to announce the immediate availability of a new integration: SecurityTrails for Phantom.
Cryptojacking campaigns continue to target vulnerable websites
Over the last seven months, we've witnessed a large growth in malicious cryptocurrency mining operations. This activity, commonly known as cryptojacking, steals the computational (CPU) resources of victims' device to mine cryptocurrency.