Security Through Obscurity
When you work as a system administrator, one of your main tasks is to keep your systems secure, and that includes applying system package updates, kernel patching, disabling unnecessary services, installing IDs and firewalls, and many other things.
Top 8 Exploit Databases for Security Researchers
Vulnerabilities are found every day, and they don’t discriminate from one operating system to another. They’re present on all operating systems used on electronic devices, from mobile phones to smart TVs, from the IoT to computers.
What is an IoC (indicator of compromise)?
Managing cybersecurity is a never-ending process that involves hardening servers, writing secure code, detecting and responding to known and unknown network security incidents, security auditing, and a very large “et cetera.” All of this is handled by different cybersecurity teams such as system administrators, security operation centers and computer emergency response teams, as well as computer security incident response teams.
Mobile Security 101: Common Threats and How to Protect Yourself Against Them
Even with an estimated 5 billion people currently possessing a mobile device, half of them being smartphones, the use of mobile technology is still growing rapidly throughout the entire world.
SecurityTrails Engineering Retreat: Bali
With all the growth SecurityTrails has been experiencing this past year, and being a fully remote company, many of us have yet to meet all of our fellow team members. When a company is still in its early stages, we tend to put much of our focus on building and perfecting our products. It might feel like there’s no time for anything other than work, but that’s when it’s time for a company retreat: on this occasion, for the entire engineering team!
Top 15 OSINT Web Browser Extensions
OSINT stands for Open Source Intelligence, as explained in our previous article What is OSINT? At that time, we learned about the concept of OSINT, how to make use of it, and its most popular techniques.
The Social Engineering Toolkit
In the cybersecurity world, there are many types of attacks and network threats. And among the most popular are social engineering attacks.
Breaking Cybersecurity Myths
We’re now at a point where cybersecurity is considered an integral part of any business, no matter how big or small. You’d be hard-pressed to find any organization that doesn’t have at least some form of cybersecurity procedures and practices in its business model, and for good reason.
Cyber Crime Investigation Tools and Techniques Explained
Investigating a crime scene is not an easy job. It requires years of study to learn how to deal with hard cases, and most importantly, get those cases resolved. This applies not only to real-world crime scenes, but also to those in the digital world.
Top 5 Talks from the 36th Chaos Communication Congress
With topics ranging from security, hardware and science to ethics, art and culture, the 36th Chaos Communication Congress delivered a lot of outstanding lectures, and we wanted to share our favorite five.