#ProTips: Understanding a Leaky Internet with Gregory Boddin
Over the past few years, data breaches involving millions of leaked records have become the norm. A common offender we’re seeing more of is the presence of poorly secured and misconfigured databases connected to the Internet.
The Equinix Attack: Understanding Ransomware Behaviour
According to the United State’s Cybersecurity and Infrastructure Security Agency (CISA), the number of ransomware attacks around the world has increased, and the Computer Emergency Response Team (US-CERT) states that this sort of breach hits a target every 14 seconds.
Reblazing Web Security, Announcing a New Product, and Listening to Records with Tzury Bar Yochay from Reblaze
Web applications contain sensitive data like user information, financial data, and intellectual property. That data is valuable and alluring to malicious attackers. Cyber attackers looking for vulnerabilities and weak spots to gain unauthorized access for stealing data keep web applications under constant threat.
SSL/TLS History: Discovering Service Encryption
Privacy in peer-to-peer communications throughout the World Wide Web has become an extremely widespread issue, especially over the last few years.
Cats, Board Games, and Analyst-Centric Threat Intelligence: Speaking with Pulsedive Co-founders Dan Sherry and Grace Chi
Two heads are better than one, and the same rings true when starting a company. You can have the idea, the entire business plan set out, the drive and desire needed, but there might be something missing. This is where most founders turn their focus to the search for a perfect co-founder. A co-founder that complements their skills, helps them turn their ideas into reality, brings a fresh perspective, and is there to support them.
ReVoLTE Attack: Encrypted Voice Calls Interception
Without a doubt, telecommunications have evolved beyond the imagination. We can now do things on our smartphones and personal computers that we once saw only in the realm of science fiction.
dnsmap: an Old-School Network Recon Tool
When it comes to the vast array of open source tools available to the infosec community in 2021, one could say we’re spoiled.
Product Update: SurfaceBrowser™ - SQL Explorer: SSL Certificate Scraping Showcase
One of our newest SurfaceBrowser™ features is SQL Explorer. This cool new feature allows you to combine the power of structured query language with our huge records database, allowing you to extract the most information possible.
Common Cyber Security Risks to Watch Out For
Data and information are power. From private companies and enterprises to government agencies, schools, health care organizations and non-profit foundations, every type of business or institution regards its data as its greatest treasure. That treasure can contain personally identifiable information (PII) such as names, addresses, birth dates, social security numbers, and medical records, as well as intellectual property—including patents, trademarks, financial information, and more.