SecurityTrails Blog

Recon Safari #4: Domains Riding the Robinhood Wave.
SecurityTrails Blog · Feb 23 · by SecurityTrails team

Recon Safari #4: Domains Riding the Robinhood Wave

During the past couple of weeks, the popular free financial trading app Robinhood made headlines for halting purchases of certain stocks. This has resulted in a lot of bad publicity for the company. And because threat actors enjoy exploiting trending news topics to their advantage, we decided to look at newly registered Robinhood domains to see how they’re being used.

Residential Proxies: Types, Usage and Dangers in Cybersecurity.
SecurityTrails Blog · Feb 04 · by Gianni Perez

Residential Proxies: Types, Usage and Dangers in Cybersecurity

Privacy concerns over a flurry of egregious corporate breach scenarios continue to upend just about any other ‘hot’ technology-related topic out there—a direct reflection of the turbulent digital landscape we find ourselves in and a constant influx of hedonic platforms (e.g., social media) making indiscriminate use of personal data, albeit the dire consequences.

Top 10 Cloud Security Threats and How to Mitigate Them.
SecurityTrails Blog · Feb 02 · by Sara Jelen

Top 10 Cloud Security Threats and How to Mitigate Them

One thing’s for sure: cloud adoption is going mainstream. It’s grown increasingly obvious that cloud computing has continuously transformed the way organizations of all sizes access, store and share data, thanks to its many benefits of rapid deployment, flexibility, low costs and scalability. But its interconnectedness and many other advantages aren’t the only things cloud computing has brought along with it—security challenges are emerging in today’s cloud era.