SecurityTrails Blog

Iran, the IRGC and Fake News Websites
Recently, the Department of Justice made two public announcements about shutting down fake news websites created by Iran’s Islamic Revolutionary Guard Corps (IRGC). In the first instance, 92 domains were seized in August 2020. And according to the second announcement, 27 more domains were seized as part of the same effort to spread global disinformation.

Making Cybersecurity Accessible with Scott Helme
Global connectivity benefits our world in numerous ways, however, that same connectivity also poses a potential cyberthreat that is often overlooked. There is no easy solution for combating the rising threats in our hyperconnected world. Now more than ever, cybersecurity is imperative for both businesses, governments and educational institutions, and individuals and families. For cybersecurity to effectively slow down the rising cyber threats and attacks, everyone needs to be part of the solution.

5 AWS Misconfigurations That May Be Increasing Your Attack Surface
Not all data breaches are created equal. While many remain the product of technical prowess so often associated with malicious actors, a burgeoning amount can be attributed to security misconfigurations and overly-permissive entitlements plaguing cloud ecosystems around the globe. Close to 70 percent in fact, according to a survey conducted by Ermetic, an identity and data protection firm.

Cyber Crime Insurance: Preparing for the Worst
Along with the growing impact of digitalization on organizations of every size and industry, their increasing reliance on computer systems and networks and the expanding attack surface, the risk of cyber crime is reaching new heights every day. That’s why now, more than ever, organizations need to protect themselves and their customers.

DNSRecon: a powerful DNS reconnaissance tool
When it comes to the efficacy and proper functioning of any modern distributed network such as the Internet, few technologies seldom rise to the level of pivotal as DNS does.

Endpoint Security and Endpoint Detection and Response - EDR
While the traditional network perimeter has, for some time, been extended to include a large number of different endpoints, many organizations still struggle to put proper security protocols in place to protect them. And whenever security controls are lacking, attackers rejoice.

Nikto: A Practical Website Vulnerability Scanner
The most critical part of any website is its web server. The web server is responsible for accepting requests from your visitors, understanding them, and giving your website visitors answers to their requests.

What is Privilege Escalation? Types, Techniques and Prevention
When attackers attempt to steal data, having insider access to a system is their best bet. And if that insider access is gained through a privileged account that holds the keys to critical systems and data, that would be like hitting the jackpot—but only for the attackers. This is why we consider privilege escalation, the attempt to compromise an account and then expand its privileges, a key component of nearly all advanced cyber attacks.

OpenVAS/GVM: An Open Source Vulnerability Scanning and Management System
Vulnerability scanning is one of the foundations of standard enterprise security. An enterprise with a good security posture will have: a firewall, some type of asset-mapping, a vulnerability scanner and possibly even a security team that does some type of pentesting. Keep in mind that the list above is not exhaustive, but the rudimentary outline of an enterprise with a few good security measures in place.

What Are Indicators of Attack (IoA)?
Indicators of compromise are great, aren’t they? They’re those little pieces of data that provide security researchers and digital forensics analysts with evidence of a breach on a system or network, and allow them to investigate the impact of the attack.