Nikto: A Practical Website Vulnerability Scanner
The most critical part of any website is its web server. The web server is responsible for accepting requests from your visitors, understanding them, and giving your website visitors answers to their requests.
What is Privilege Escalation? Types, Techniques and Prevention
When attackers attempt to steal data, having insider access to a system is their best bet. And if that insider access is gained through a privileged account that holds the keys to critical systems and data, that would be like hitting the jackpot—but only for the attackers. This is why we consider privilege escalation, the attempt to compromise an account and then expand its privileges, a key component of nearly all advanced cyber attacks.
OpenVAS/GVM: An Open Source Vulnerability Scanning and Management System
Vulnerability scanning is one of the foundations of standard enterprise security. An enterprise with a good security posture will have: a firewall, some type of asset-mapping, a vulnerability scanner and possibly even a security team that does some type of pentesting. Keep in mind that the list above is not exhaustive, but the rudimentary outline of an enterprise with a few good security measures in place.
What Are Indicators of Attack (IoA)?
Indicators of compromise are great, aren’t they? They’re those little pieces of data that provide security researchers and digital forensics analysts with evidence of a breach on a system or network, and allow them to investigate the impact of the attack.
Introducing the SecurityTrails API™ PHP Wrapper
An API can be accessed in different ways, via your browser or your command line, but the easiest way is by using an API wrapper. While API access points may change over time, using an API wrapper will ensure the way you call the API always remains the same in your code.
Exploring Watering Hole Attacks: Tactics, Examples and Prevention
In order to survive, cybercrime must evolve. Cybersecurity experts are constantly working on tools, tactics and practices to monitor, prevent and respond to threats, patch vulnerabilities and avoid zero day threats. And while technology is constantly evolving, cybercriminals are constantly creating new attacks to fit the trends as well as tweak existing attacks to avoid detection.
Introducing Regex (RLIKE) Support for Hostnames in SQL Explorer
A couple of months ago we were delighted to share big news about one of the hottest features of SurfaceBrowser™: SQL Explorer. Introducing this new SQL-based feature allowed many of our customers to perform classic SQL-based queries against our massive infosec database and all its host and IP attributes.
Understanding Data Loss Prevention - DLP
Data loss has long been a serious issue for businesses of all sizes. Yet despite growing awareness surrounding the issue — and the security measures taken to prevent it — the number of data breaches continues to grow every year. Even worse, losing data isn’t only just losing data: it also brings with it financial impact, loss of customer trust, corporate liability, loss of current and future business, and often some very hefty legal fines.
Recon Safari #2: Looking at the OSINT Behind Fake US Census Bureau Domains
Just recently, we came across a flash alert released by the FBI concerning 63 domains that were impersonating the US Census Bureau. We were intrigued and wanted to investigate further, so for our second Recon Safari we’re going to look at what OSINT data we can uncover from these spoofed domains.