Blog Home SecurityTrails Blog · Jun 04 · BadPacketsReports & SecurityTrails Team Cryptojacking campaigns continue to target vulnerable websites Over the last seven months, we've witnessed a large growth in malicious cryptocurrency mining operations. This activity, commonly known as cryptojacking, steals the computational (CPU) resources of victims' device to mine cryptocurrency. SecurityTrails Blog · May 29 · SecurityTrails team Spiderfoot, an Open Source Intelligence Automation Tool Some time ago we mentioned the cool integration of our security platform into Spiderfoot, one of the best reconnaissance and threat intelligence tools around. Today, we are going to tell you a little bit more about this fantastic security tool. SecurityTrails Blog · May 22 · SecurityTrails team Top 5 Best Port Scanners Port scanners are some of the most useful tools when you are starting your security investigation on any remote or local network. Let's explore the top five most popular port scanners tools used in the infosec field. SecurityTrails Blog · Apr 26 · SecurityTrails team Exploring the complete list of Cloudflare public DNS domains We all know Cloudflare proxy services are rock solid products, but thanks to the way DNS servers and Internet protocols work, they are not as anonymous as most people think. SecurityTrails Blog · Apr 17 · SecurityTrails team Top 20 Data Reconnaissance and Intel Gathering Tools When you start an IT security investigation, the first phase you will face is the data reconnaissance and intel gathering about your target. Once you finish gathering information about your objective you will have all the needed information like IP addresses, domain names, servers, technology and much more so you can finally conduct your security tests.