Reblazing Web Security, Announcing a New Product, and Listening to Records with Tzury Bar Yochay from Reblaze
Web applications contain sensitive data like user information, financial data, and intellectual property. That data is valuable and alluring to malicious attackers. Cyber attackers looking for vulnerabilities and weak spots to gain unauthorized access for stealing data keep web applications under constant threat.
SSL/TLS History: Discovering Service Encryption
Privacy in peer-to-peer communications throughout the World Wide Web has become an extremely widespread issue, especially over the last few years.
Cats, Board Games, and Analyst-Centric Threat Intelligence: Speaking with Pulsedive Co-founders Dan Sherry and Grace Chi
Two heads are better than one, and the same rings true when starting a company. You can have the idea, the entire business plan set out, the drive and desire needed, but there might be something missing. This is where most founders turn their focus to the search for a perfect co-founder. A co-founder that complements their skills, helps them turn their ideas into reality, brings a fresh perspective, and is there to support them.
ReVoLTE Attack: Encrypted Voice Calls Interception
Without a doubt, telecommunications have evolved beyond the imagination. We can now do things on our smartphones and personal computers that we once saw only in the realm of science fiction.
dnsmap: an Old-School Network Recon Tool
When it comes to the vast array of open source tools available to the infosec community in 2020, one could say we’re spoiled.
Product Update: SurfaceBrowser™ - SQL Explorer: SSL Certificate Scraping Showcase
One of our newest SurfaceBrowser™ features is SQL Explorer. This cool new feature allows you to combine the power of structured query language with our huge records database, allowing you to extract the most information possible.
Common Cyber Security Risks to Watch Out For
Data and information are power. From private companies and enterprises to government agencies, schools, health care organizations and non-profit foundations, every type of business or institution regards its data as its greatest treasure. That treasure can contain personally identifiable information (PII) such as names, addresses, birth dates, social security numbers, and medical records, as well as intellectual property—including patents, trademarks, financial information, and more.
RustScan: Empowering Nmap One Scan at a Time
We all love Nmap, we really do. It’s one of the first and most famous OSINT-like security tools created, written almost 23 years ago (at the time of this writing) by Gordon “Fyodor” Lyon.
Risk Assessment vs. Risk Analysis vs. Risk Management: When Being Optimistic Isn’t Ideal
Life is about taking risks. Business is about taking risks. Heck, anything you do involves taking risks. But you wouldn’t jump right off a cliff into unknown waters, would you? You’d want to know: How deep is the water? Are there sharks? Is there anyone around you who could help if you needed it? Are you even ready to make the jump?
New SurfaceBrowser™ Features: Hosting Visualization, Tags and SQL Explorer
We are excited to announce the immediate availability of Hosting Visualization, Tags for hostnames, and SQL Explorer in SurfaceBrowser™. Keep reading to learn more about the new features and how to get them enabled on your existing account.