SecurityTrails Blog

Top 100+ Best Security Companies in 2020.
SecurityTrails Blog · Jun 23 · by Sara Jelen

Top 100+ Best Security Companies in 2020

With organizations connecting their critical business operations and sensitive data to information technology systems, they rely on a number of networks, software, protocols and services. This makes detecting intrusion and threats increasingly challenging. And particularly when it’s necessary to determine the essential who, where, how and why before a threat results in an actual cyber attack, disrupting operations and compromising sensitive data.

Covert Channel Discovery: Understanding Network Extrusions.
SecurityTrails Blog · Jun 18 · by Nicolás Pence

Covert Channel Discovery: Understanding Network Extrusions

Based on a true series of events: “…I was ready to begin this long-awaited vacation at that awesome paradisical location I’ve been dreaming of for years. Oh no! The moment I stepped out of the room it hit me: I’d completely forgotten to send that incredibly urgent and important email before leaving home. This needs to be fixed right now! But how? Look at me, I’m at this oceanic hotel villa under a palm tree in the middle of nowhere. Internet pricing here is absurd, there’s no way I’ll pay for this… what can I do?”

Phishing Toolkit: Top 20 Best Phishing Tools.
SecurityTrails Blog · Jun 09 · by Sara Jelen

Phishing Toolkit: Top 20 Best Phishing Tools

Phishing is the most common type of social engineering attack, as well as one of the most frequent attack methods on the Internet in general. It’s a simple concept: creating a fake website that impersonates a legitimate one that the target frequents, and sending them a security notice that urges them to ‘click on the following link’—which then leads them to a fake website, where they’ll be prompted to log in.