Bringing Cybersecurity into Academia: We Talk with Patrik Hudak
The rise of cyberthreats, in both scale and technique, has brought an increased attention to and demand for cybersecurity. However, academia and the publication of academic papers, struggle to keep up with the frequent shifts in trends and methods. Coupled with the fact that many people interested in cybersecurity are working professionals who may not have the time to read more lengthy academic papers, we are seeing more people turn to conference papers and blog posts for this information.
IP Lookup: Exploring the Top 8 Ways to Perform an IP Address Lookup
Every machine located within a TCP/IP network (it could be a LAN -local network- or a Wan -the Internet-) has a uniquely assigned Internet Protocol address. This address is known as the IP address, or simply, the IP.
SecurityTrails Subdomain Finder Tools: The Fastest Way to Discover Subdomains in Your DNS Recon
For 99% of the times you’re performing intel gathering steps during infosec research or penetration testing, DNS reconnaissance is a primary course of action.
No Incident Unnoticed: Interview with Troy Mursch from Bad Packets Report
In 2017 we saw the rise of cryptojacking and botnet activity. Even through 2018, it showed no signs of stopping. Notably, we saw plenty of unique cryptojacking campaigns that targeted vulnerable MikroTik routers and Drupal websites, as well as other types of botnets that were Mirai-like aberrations.
DNS Toolbox: How to Perform a Full DNS Enumeration and Domain Research
As we’ve said before, DNS is still the heart and soul of the Internet. It’s the core service that makes everything work—without it the net wouldn’t be as widespread as it is today.
OSINT is Maturing: Our Interview with Steve Micallef from SpiderFoot
Only a few years back, OSINT wasn’t that widespread, but today advancements in the OSINT field have encouraged the constant growth of, not just the tools that are available, but also the community around it.
How to Find Associated Domains and Domain WHOIS Information Using SurfaceBrowser™
In previous articles, we’ve shown you some of the powerful features of our enterprise-grade product SurfaceBrowser™, such as How to analyze SSL certificates. We’ve also written about the new Explore feature, that allows you to jump between different data-sets of information from our intelligence database. Today we will dig into two additional features: SurfaceBrowser™ Associated Domains and WHOIS historical information.
Exploring Google Hacking Techniques
Some time ago we wrote an interesting post about the OSINT concept and its importance in the security researching world, showing how easy it is to get information from publicly available sources on the Internet. Last week one of our developers shared an interesting link he found — one that was exposing many supposedly “private” resources from different websites.
Domain Tools: top DNS, IP and Domain utilities to investigate any website
Domain names are one of the top things you will check when it comes to a cybersecurity investigation. They are the key to open a treasure trove that, when analyzed correctly, may reveal deep secrets about the company, individuals, servers, IPs, network technology and DNS zones behind the TLD.
Every packet has a story: Speaking with Andrew Morris from GreyNoise Intelligence
Imagine this scenario: You’re at a security operation center, looking through your firewall and Nginx logs, and you see an IP address scanning your network. Is it someone targeting you specifically or just mass scanning? How can you be sure either way? How can you know with certainty which incidents really matter?