Shodan: Diving into the Google of IoT Devices
In this day and age, IoT devices are just about anywhere and everywhere. It’s not uncommon to find a smart TV, a WiFi router or even a webcam in the garage—not to mention all the other internet-connected devices we use every day.
Why It’s Important to Play in the Safe Zone and Use a Sandbox
Imagine an operating system without much security. Installing any new program would be risky business—it could replace your system files, discover passwords, even delete everything. Sounds like a nightmare? Well, that’s what a sandbox can prevent.
Attack Surface Mapper - A Tool for Boosting Your Reconnaissance Process
Are you aware of your infrastructure’s weakest spots? Attackers surely are. Target reconnaissance is one of their first steps toward getting full insight into an objective, one that will eventually develop into a complete attack strategy to compromise assets.
Managing Cyber Exposure One of Security’s Most Dangerous Perils
Security professionals today constantly need to appease the growing number of digital assets on a network: cloud platforms, containers, web applications, IoT devices, operational technologies, and the list goes on. The more assets one has, the more opportunities for malicious actors to break defenses and get access to sensitive data.
Recon Safari #1: A Closer Look at Friendemic’s Data Breach
We’ve been having some Friday fun running SecurityTrails Recon Safari on Twitter. Over the past few months, we’ve conducted over 30 successful investigations that were easy to research thanks to SecurityTrails API™ and SurfaceBrowser™. And as a result, Recon Safari began in the form of long Twitter threads, eventually evolving into fun and digestible infographics, ultimately followed by a writeup on our blog.
Threat Detection: Using Cisco’s SecureX with the SecurityTrails Module
Are you a Cisco SecureX user? Conducting cyber threat intelligence campaigns? Now you can integrate the SecurityTrails API™ into your existing SecureX Dashboards, by using a serverless relay running Amazon’s Lambda infrastructure.
Be Cyber Smart: 10 Do’s and Don’ts of Staying Safe Online
October is the National Cybersecurity Awareness Month (NCSAM) aimed towards raising awareness about the importance of cybersecurity and sharing the knowledge and resources needed to stay secure while connected. This year’s theme is “Do Your Part. #BeCyberSmart” and we, of course, want to do our part.
Subdomain-Enum: Enumerating Subdomains with the SecurityTrails API™
One of the core products at SecurityTrails is our API. And to ensure that its usage is simple and user-friendly, we strive to follow industry best practices and standardization that the user base will be familiar with.
Residential Evil: Addressing the Role of Anonymization Infrastructure in Cybercrime with Tom Kilmer from Spur
In recent years, more emphasis is put on privacy concerns and data security while online. The shields at the forefront of this battle for privacy and secure internet access are VPNs and proxies, and more notably residential IP proxies. While claiming to offer anonymization to users, residential proxies also account for some security issues.
October Product Updates: Downloads, Host Page Improvement, Egress traffic, and more.
We are thrilled to announce new features for SurfaceBrowser™, our SecurityTrails API™, and Console.