Blog Home SecurityTrails Blog · Sep 11 · SecurityTrails team Top CVE's exploited in the wild In previous posts, we’ve explored ways to avoid security issues by hardening DNS servers, and also by following best SSH Security practices. However, today we are not going to show you how to protect against attacks. Instead, we will show you the top 10 most dangerous vulnerabilities exploited in the wild during the current year. SecurityTrails Blog · Jun 14 · SecurityTrails team Announcing our SecurityTrails + Phantom app integration Some time ago we wrote about our SecurityTrails Splunk plugin - and today, we are super excited to announce the immediate availability of a new integration: SecurityTrails for Phantom. SecurityTrails Blog · Jun 04 · BadPacketsReports & SecurityTrails Team Cryptojacking campaigns continue to target vulnerable websites Over the last seven months, we've witnessed a large growth in malicious cryptocurrency mining operations. This activity, commonly known as cryptojacking, steals the computational (CPU) resources of victims' device to mine cryptocurrency. SecurityTrails Blog · May 29 · SecurityTrails team Spiderfoot, an Open Source Intelligence Automation Tool Some time ago we mentioned the cool integration of our security platform into Spiderfoot, one of the best reconnaissance and threat intelligence tools around. Today, we are going to tell you a little bit more about this fantastic security tool. SecurityTrails Blog · May 22 · SecurityTrails team Top 5 Best Port Scanners Port scanners are some of the most useful tools when you are starting your security investigation on any remote or local network. Let's explore the top five most popular port scanners tools used in the infosec field.