DNS Root Servers: What Are They and Are There Really Only 13?
The Domain Name System is one of the most important internet services in existence, without which we wouldn’t be able to access any online content or even send an email. In fact, every time we try to connect to a website or any other online service, DNS root servers help our computers find and reach the desired addresses.
Domain Security & Solutions, Part 3: Stale DNS Records & Subdomain Takeover Attacks
Since the beginning, the Internet has been powered by servers. Going back a few decades, most companies used bare metal servers. Then came VPS servers, which allowed people to run virtual operating systems in a single dedicated server with different applications, database technologies, and more.
Cloudflare shutting down 8chan: the Internet shelter for hatred
This morning we were surprised by the recent news announcing that Cloudflare is going to shut down the popular website 8chan (8chan.net) from their infrastructure.
Top 10 Cybersecurity Legends You Should Know About
Cybersecurity is growing quickly and it might seem difficult to keep up with all the latest developments and trends. But there are some trends—or better yet, people—who have left their unmistakable imprint on the history of cybersecurity.
Domain Security & Solutions, Part 2: Phishing & Trademark Infringement Attacks
Millions of emails are sent every day, and a few of them will surely hit your inbox. Apart from your personal, notification and corporate emails, you’ll undoubtedly be asked to open emails from “companies” inviting you to update your account’s personal details with a certain bank, or with other popular online services such as Google, Apple or Dropbox.
Know Your Assets: Talking with Jonathan Cran from Intrigue
The constant risk of cyberthreats on organizations and their digital landscapes makes knowing your assets and the extent of your attack surface crucial. Reconnaissance is one of the first steps attackers will take to discover any unprotected and unmonitored assets, and use them as means to gain access to your network.
Domain Security & Solutions – Part 01: Cybersquatting & Copyright Infringement
When we think about cyber attacks and general network threats, we usually imagine massive flood attacks, SQL injections and web application vulnerabilities.
How to Install Kali Linux in the Cloud
Kali Linux is one of the top cybersecurity Linux distributions available. It’s a great distro created by the Offensive Security group, and we at SecurityTrails love it. In fact, we’ve written a few articles in the past showing the true power of Kali Linux, as in the Top 20 Kali Linux Tools, or when we mentioned some of today’s most popular ethical hacking tools.
Cyber Threat Intelligence
We are living in the age of data. The explosive data growth we are experiencing shows no signs of stopping, as reports show that the size of total worldwide data will grow to 163ZB in next 10 years.
Hacker vs Cracker: Main Differences Explained
Media coverage of data breaches is increasing rapidly, especially with the public’s watchful eye on organizations and the vulnerable systems they work with — easy targets for exploitation. However, the less-than-dramatic truth is that the frequency and scale of data breaches hasn’t really soared* in the past decade, even if people are still at great risk of having their data exposed. The media itself has brought on the hype and created a fear culture around data breaches and malicious attackers.