SecurityTrails Blog

What Are Certificate Transparency Logs?.
SecurityTrails Blog · Oct 25 2018 · SecurityTrails team

What Are Certificate Transparency Logs?

SecurityTrails has introduced to you our new Feeds page, SurfaceBrowser™, and the option of getting certificate transparency logs, all of them in unified format so you’re able to extract any information needed. And while Google has announced they’ll be requiring Certificate Transparency for all newly-issued publicly trusted certificates, highlighting transparency and accountability through Certificate Authorities, there are still people who don’t get the importance of Certificate Transparency logs and the value of the information within them.

Top 10 Common Network Security Threats Explained.
SecurityTrails Blog · Oct 16 2018 · SecurityTrails team

Top 10 Common Network Security Threats Explained

The old childhood warning “Stranger danger!” has withstood the test of time even in our modern, developed world. Now that most of our daily procedures and activities are automatized and available for use on the Internet, we need to take the same level of precaution we did as children, crossing to the other side of the street whenever we saw a suspicious stranger. This precaution is needed even more after seeing some critical statistics surface, claiming that nearly one-third of the world’s computers are infected with some type of malware.

Top 15 Ethical Hacking Tools Used by Infosec Professionals.
SecurityTrails Blog · Oct 09 2018 · SecurityTrails team

Top 15 Ethical Hacking Tools Used by Infosec Professionals

Automated tools now rule the Internet; you can find a few to make your social networks grow, others to answer emails automatically, and even bots to help your online customers. Of course, hacking has evolved too: nowadays you can find a lot of automated OSINT Tools that can help anyone with security research and intel reconnaissance in a way that just wasn’t possible twenty years ago.