Blog Home

SecurityTrails Blog

Being Okay With Not Being Okay: Getting Candid with Ben Sadeghipour — NahamSec.
SecurityTrails Blog · Jun 22 · by Sara Jelen

Being Okay With Not Being Okay: Getting Candid with Ben Sadeghipour — NahamSec

Cyber resilience is vital for organizations of all sizes across all industries; it is no wonder the cybersecurity industry is evolving at such a rapid pace. Ethical hackers, security researchers, and professionals play one of the most valuable roles in safeguarding organizations from malicious actors. While organizations embrace new technologies and recruit more security professionals to aid, one aspect often remains overlooked.

Reactive vs. Proactive Security: Which Is Better?.
SecurityTrails Blog · May 25 · by Sara Jelen

Reactive vs. Proactive Security: Which Is Better?

As networks and technology rapidly evolve, many organizations face the challenges of expanding their attack surface. A truly successful approach to dealing with these challenges involves multiple layers of protection that encompass networks, devices, data and people. And to add more fuel to issues brought on by technology and security sprawl growth, malicious actors are constantly working on new techniques, tools and methods to execute attacks on organizations’ data.

5 minutes to Build a Basic Monitoring and Alerting System for New Subdomains.
SecurityTrails Blog · May 20 · by Luke Stephens

5 minutes to Build a Basic Monitoring and Alerting System for New Subdomains

I spent a very long time automating my recon for bug bounties. I collaborated with a couple of friends for about 12 months to build out an automation beast. We had a custom framework, and constant recon scanning with good distribution (at times we scaled up to 100+ servers). We stored data on millions of targets and had Slack notifications for vulnerability detection. It was the third iteration of our automation and we thought it was great. I mean, it was pretty great, and it definitely helped us earn some cash on a few popular bounty programs.

Shadow IT and Its Security Risks - Managing the Unseen.
SecurityTrails Blog · May 18 · by Sara Jelen

Shadow IT and Its Security Risks - Managing the Unseen

Cloud computing is beneficial. Many organizations already know this and are reaping the benefits cloud adoption has brought them: reduced IT costs, scalability, collaboration efficiency and, above all else, flexibility in accessing storage and software to meet their needs. Users can now more easily engage services and solutions that will make their everyday jobs easier.