RustScan: Empowering Nmap One Scan at a Time
We all love Nmap, we really do. It’s one of the first and most famous OSINT-like security tools created, written almost 23 years ago (at the time of this writing) by Gordon “Fyodor” Lyon.
Risk Assessment vs. Risk Analysis vs. Risk Management: When Being Optimistic Isn’t Ideal
Life is about taking risks. Business is about taking risks. Heck, anything you do involves taking risks. But you wouldn’t jump right off a cliff into unknown waters, would you? You’d want to know: How deep is the water? Are there sharks? Is there anyone around you who could help if you needed it? Are you even ready to make the jump?
New SurfaceBrowser™ Features: Hosting Visualization, Tags and SQL Explorer
We are excited to announce the immediate availability of Hosting Visualization, Tags for hostnames, and SQL Explorer in SurfaceBrowser™. Keep reading to learn more about the new features and how to get them enabled on your existing account.
Insider Threats in Cybersecurity: The Enemy Comes From Within
People, process, and technology are the pillars of cybersecurity. And while people are every organization’s best asset, they are also its biggest weakness. Security technology continuously evolves to counter emerging security threats and new techniques, but there is one threat that can’t be thwarted by merely employing new tools and processes. The biggest security threats of today are not the result of malicious attackers, advanced persistent threats, or malware. They come from within.
Recon-ng: An Open Source Reconnaissance Tool
The OSINT tools arsenal is now filled with more pieces of code that help “get things done” better, faster and more effectively than ever before. And Recon-ng, with its modular design, brings you a familiar way to operate a command line while its similar syntax to the Metasploit framework allows you to mount different purpose modules and configure them independently.
What is Security Orchestration? Where Can it Help, its Benefits and What is SOAR
When looking at any security team, one thing you might notice is that there is a tool for everything. And we do mean everything: ticketing, threat intelligence, security investigations, malware analysis, detection, incident response, advanced persistent threats, security monitoring… the list goes on.
Subfinder: A Practical Subdomain Exploration Tool
In one of our previous posts about information gathering, we covered the basics on how to get the right intel information about any organization, and that of course includes DNS intelligence.
What is Hacktivism? Civil Disobedience, Cyberterrorism, or Something Else?
There are different motivations behind hackers’ actions. They can be stirred by anything from monetary gain to bragging rights to boredom (‘because they can’). But frequently, the driving force behind breaking into systems, stealing information and disrupting services is to demonstrate civil disobedience.