6 Tips to Harden Your HTTP Headers
Web-based attacks are one of the most common types of cybercrime, and in most cases, the attacked protocol is the HTTP, while the component that receives the attacks is the web server.
What’s New at SecurityTrails: New Domain SSL, IP WHOIS and IP User Agent API Endpoints
Today, we are sharing the release of new API endpoints to fetch SSL certificate information for hostnames, IP WHOIS contacts and abuse information as well as User Agent information for IP addresses. In addition to the new API endpoints we have also updated our Console. Check out the full Changelog which is updated whenever we roll out new changes.
Security Through Obscurity
When you work as a system administrator, one of your main tasks is to keep your systems secure, and that includes applying system package updates, kernel patching, disabling unnecessary services, installing IDs and firewalls, and many other things.
Top 8 Exploit Databases for Security Researchers
Vulnerabilities are found every day, and they don’t discriminate from one operating system to another. They’re present on all operating systems used on electronic devices, from mobile phones to smart TVs, from the IoT to computers.
What is an IoC (indicator of compromise)?
Managing cybersecurity is a never-ending process that involves hardening servers, writing secure code, detecting and responding to known and unknown network security incidents, security auditing, and a very large “et cetera.” All of this is handled by different cybersecurity teams such as system administrators, security operation centers and computer emergency response teams, as well as computer security incident response teams.
Mobile Security 101: Common Threats and How to Protect Yourself Against Them
Even with an estimated 5 billion people currently possessing a mobile device, half of them being smartphones, the use of mobile technology is still growing rapidly throughout the entire world.