DNS Hijacking: How to Identify and Protect Against It
A cyber threat thought by many to be a thing of the past has seen its resurrection over the past couple of months. Earlier in the year, we saw reports about widespread DNS hijacking campaigns targeting the Middle East and North Africa with a few in Europe and the US. That was followed by information about DNS hijacking attacks targeting home routers and phishing websites that imitate Netflix, PayPal, Uber, Gmail and more.
What’s My DNS? How to Find Domain DNS Records with our DNS Checker
The DNS system is involved with almost everything connected to the Internet. Here at SecurityTrails, we use it to build our core products and services focusing on passive DNS information, domain names, IP addresses, SSL certificates and port scanning.
Find Vulnerabilities Before They Become Yours: Cybersecurity with Mergers and Acquisitions
All digital assets, including network systems, data and the way it’s stored and protected, are the foundation of any successful business. That’s why they can pose a significant business risk. The dependence of modern businesses on their digital records raises their potential vulnerability to security breaches.
Top GitHub Dorks and Tools Used to Scan GitHub Repositories for Sensitive Data
For years, using Github as your main repository for application development version control has been the industry standard. Even in the presence of many competitors, Github still stands as the number one option. Millions of developers push code changes to GitHub several times in a single day, and those changes can be overwhelming when you’re working simultaneously with distributed dev teams ‘round the clock. Troubles arise when developers accidentally include password credentials, usernames or cloud-based keys in their public and private repos.
Cloud security, open S3 buckets and where do we stand now: Interview with Vincent Yiu
While cloud computing itself is not a new concept, everything related to it is in a constant state of change and rapid growth. Adoption is at an all-time high, with the market projected to grow to over $302 billion by 2021 and a consistent emphasis on cloud security.
Where You’ll Find Us: An Overview of SecurityTrails Integrations
Last week, we were excited to share the news about our latest SecurityTrails integration: the YETI Analytics plugin. Now it’s time to recap all the SecurityTrails integrations and tools currently using our intelligence platform.
YETI Analytics Plugin for SecurityTrails
We’ve written about past integrations with our powerful API before, most recently about our latest R language integration. Today we’re excited to show you a new SecurityTrails API integration. This time it’s one written by Manabu Niseki, and it’s specifically a plugin for the YETI platform.
Cybersecurity Fingerprinting Techniques and OS-Network Fingerprint Tools
In the physical world, analyzing fingerprints is one of the most popular techniques used to identify people involved with all types of crimes, from robbery to kidnapping or even murder.
Cybersecurity Experts Interview Series Recap
Today we are recapping our interview series we started back in February, and all the great people we’ve had the chance to talk to.
Attack Surface: Concept, Types, Tools and Attack Surface Reduction Strategies
A while back we talked about the concept of OSINT, and how important it is to the infosec industry.