Rumble Network Discovery: A Powerful Cloud-Based Infosec Mapping Platform
Network discovery is an essential part of both network management and cyber threat intelligence tasks, with the former often conducted by a network or system administrator, and the latter performed by infosec researchers and penetration testers.
Accepting the Irrationality Of Biases in InfoSec: Interview with Kelly Shortridge
The human brain is incredibly complex and powerful, but as with everything powerful, it comes with its own set of limitations. As humans, we’re not always as rational in our decision making as we’d hope to be. It’s unreasonable to think InfoSec professionals are an exception to this rule.
Top 7 IP Scanner Tools for Network Mapping
IP scanning, or IP mapping, is one of the oldest and most traditional tasks performed by people in all types of IT roles, from system administrators and network engineers to security researchers. When you’re working with a company with a large number of connected networks, managing all that IP address allocation could be somewhat tricky.
Social Engineering: What Is It? Types of Social Engineering Attacks and How to Protect Yourself from Them
With human error being the top cause of data breaches¹ in all kinds of organizations, it isn’t surprising that a type of cyber attack that exploits human psychology would be one of the most common threats to enterprise security we see.
Domain Security & Solutions, Part 4: How to Protect your Account at your Registrar
Not all entrepreneurs and developers are truly aware of the implications of losing a domain name. That’s why keeping it secure has to be one of your top priorities when running a company or business with an online presence.
DNS Root Servers: What Are They and Are There Really Only 13?
The Domain Name System is one of the most important internet services in existence, without which we wouldn’t be able to access any online content or even send an email. In fact, every time we try to connect to a website or any other online service, DNS root servers help our computers find and reach the desired addresses.
Domain Security & Solutions, Part 3: Stale DNS Records & Subdomain Takeover Attacks
Since the beginning, the Internet has been powered by servers. Going back a few decades, most companies used bare metal servers. Then came VPS servers, which allowed people to run virtual operating systems in a single dedicated server with different applications, database technologies, and more.
Cloudflare shutting down 8chan: the Internet shelter for hatred
This morning we were surprised by the recent news announcing that Cloudflare is going to shut down the popular website 8chan (8chan.net) from their infrastructure.
Top 10 Cybersecurity Legends You Should Know About
Cybersecurity is growing quickly and it might seem difficult to keep up with all the latest developments and trends. But there are some trends—or better yet, people—who have left their unmistakable imprint on the history of cybersecurity.