SecurityTrails Blog

Introducing the Palo Alto Networks Cortex XSOAR + Attack Surface Intelligence Integration
We are super excited to announce the immediate availability of our Palo Alto Cortex XSOAR + Attack Surface Intelligence integration.

The Current State of CI/CD Security, and How to Prevent Common Mistakes
An ever-growing need for faster and structured development has meant that CI/CD tools have become integrated into the core of an organization's development processes.

New Project Risk History tab, Screenshots and UX Improvements
A few days after the successful release of our latest product updates, another round of improvements came to the Attack Surface Intelligence platform. Keep reading to find out more!

Slipping Under the Radar: CVE-2022-26501 - Veeam Unauthenticated RCE
Veeam Software, a global leader in data backup, replication, and disaster recovery solutions, recently disclosed a series of software vulnerabilities affecting the Veeam Distribution Service (VDS) of its flagship Veeam Backup Server line of products.

Exploring the Attack Surface Intelligence and Tines integration
A few days ago we happily announced the immediate release of our Risk Rules API + the integration with Tines, the popular platform designed to help security and ops teams automate manual workloads.

August Product Update: Exposed Admin Panels, Risk Rules API, Risk History by Host, and more!
At SecurityTrails we continuously upgrade, improve and enhance the quality of user experience in our Attack Surface Intelligence platform.

Introducing Risk Rules API + the New Tines Integration
Today we’re excited to introduce our new and highly anticipated Risk Rules API. This new API endpoint allows users to access Attack Surface Intelligence (ASI) information from their own apps and to receive risk rules valuable data immediately.

Atlassian Confluence on-premise vulnerability: Remote access with a hard-coded password
This vulnerability affects on-premise installations of Confluence, where the “Questions for Confluence” add-on is installed or has been installed at any point. Admins should update their instances immediately and ensure they have not been compromised.

Popular Misconfigurations that Make Containerized Apps Vulnerable to Attacks
With today’s staggering number of internet users, and the fact that web applications themselves are doing more than they ever have in the past, scaling, maintaining, and developing large web applications has become a significant challenge for DevOps teams.

Guide and Enrich Red Team Operations with Attack Surface Intelligence
One of the many cognitive spaces where cybersecurity practitioners often like to boast of ingenuity lies in the realm of adversarial emulation.