Attack Surface Mapper - A Tool for Boosting Your Reconnaissance Process
Are you aware of your infrastructure's weakest spots? Attackers surely are. Target reconnaissance is one of their first steps toward getting full insight into an objective, one that will eventually develop into a complete attack strategy to compromise assets.
Threat Detection: Using Cisco’s SecureX with the SecurityTrails Module
Are you a Cisco SecureX user? Conducting cyber threat intelligence campaigns? Now you can integrate the SecurityTrails API™ into your existing SecureX Dashboards, by using a serverless relay running Amazon's Lambda infrastructure.
Subdomain-Enum: Enumerating Subdomains with the SecurityTrails API™
One of the core products at SecurityTrails is our API. And to ensure that its usage is simple and user-friendly, we strive to follow industry best practices and standardization that the user base will be familiar with.
The Equinix Attack: Understanding Ransomware Behaviour
According to the United State's Cybersecurity and Infrastructure Security Agency (CISA), the number of ransomware attacks around the world has increased, and the Computer Emergency Response Team (US-CERT) states that this sort of breach hits a target every 14 seconds.
SSL/TLS History: Discovering Service Encryption
Privacy in peer-to-peer communications throughout the World Wide Web has become an extremely widespread issue, especially over the last few years.
ReVoLTE Attack: Encrypted Voice Calls Interception
Without a doubt, telecommunications have evolved beyond the imagination. We can now do things on our smartphones and personal computers that we once saw only in the realm of science fiction.
Product Update: SurfaceBrowser™ - SQL Explorer: SSL Certificate Scraping Showcase
One of our newest SurfaceBrowser™ features is SQL Explorer. This cool new feature allows you to combine the power of structured query language with our huge records database, allowing you to extract the most information possible.
RustScan: Empowering Nmap One Scan at a Time
We all love Nmap, we really do. It's one of the first and most famous OSINT-like security tools created, written almost 23 years ago (at the time of this writing) by Gordon "Fyodor" Lyon.
Recon-ng: An Open Source Reconnaissance Tool
The OSINT tools arsenal is now filled with more pieces of code that help "get things done" better, faster and more effectively than ever before. And Recon-ng, with its modular design, brings you a familiar way to operate a command line while its similar syntax to the Metasploit framework allows you ...