Top 5 Nmap Online Alternatives
While working with a terminal on Unix or Linux can feel like the better part of driving a manual car, with the vehicle’s full power in your hands and the sense you get of old-fashioned control, some people prefer the automatic variety. These people want an easier experience, with something that simply “works” while doing much of the work for you.
Top 5 Password Managers to Keep Your Accounts Safe
Most of us have a number of online accounts, and often fall into a rut of reusing the same password for some, if not all, of them. Convenience aside, having a strong password provides critical protection from cyber attacks—as one of the most common ways hackers break into systems is by merely guessing at passwords.
How to Check the Domain Owner History
Last week, we published an interesting topic about newly registered domain names, and how monitoring these could help the infosec industry investigate malicious incidents such as malware, viruses and phishing campaigns.
From heroes to deviants: Discussing the cultures of hacking with Gabriella Biella Coleman
When talking about hacker cultures, the media often blurs the lines between the act of hacking and criminality, inadventaly propping up stereotypes that plague the figure of the hacker. In reality, hackers feed into a socially and politically significant subculture with unique social and behaviora...
Newly registered domain feeds
In the current digital era, information is power, and the Internet is run by two main things: domain names and IP addresses. Without both, there would be is no way to reach online services.
Cyber Counterintelligence: When Defense Alone is No Longer Sufficient
“The best defense is good offense” is a saying that can be applied to many fields: military, games, business… and cybersecurity. However, the standard ‘defense-only’ approach many organizations have been taking is simply not sufficient for dealing with the current threat landscape. And just as intelligence services keep an eye on terrorists to stop them before they attack, organizations should move towards adopting the offensive approach to protect their infrastructure and systems.
IP Intelligence: The Fuel Behind Modern Cybersecurity
We’ve published a lot of articles that involve the ‘intelligence’ topic, because it’s one of the most requested subjects for both blue and red teams. And despite what many non-technical people may think, cybersecurity isn’t only defined by DDoS attacks, massive defacing, and other popular types of cyber crime, it’s also defined by intelligence data.
The Purple Team: What It Is and How Your Organization Can Benefit from Having One
Regardless of the size and the industry of an organization, one of the most effective ways to discover infrastructure vulnerabilities and thwart possible cyber threats is to rely on the expertise of both red teams and blue teams.
Ransomware Attacks: What They Are, Common Types and How to Protect Yourself
It’s no wonder ransomware is one of the most feared types of cybercrime out there. The idea of being denied access to your system or personal files and having them held under ransom by a malicious attacker is one of the worst scenarios most of us can imagine.
Top 10 Cybersecurity Blogs to Follow in 2020
Whether you’re a security professional, looking to pursue a career in this industry, or simply interested in the current security and threat landscape—and its societal, cultural and political impact—cybersecurity blogs are often the best source of information you can find online.