Threat Detection: Using Cisco’s SecureX with the SecurityTrails Module
Are you a Cisco SecureX user? Conducting cyber threat intelligence campaigns? Now you can integrate the SecurityTrails API™ into your existing SecureX Dashboards, by using a serverless relay running Amazon’s Lambda infrastructure.
Be Cyber Smart: 10 Do’s and Don’ts of Staying Safe Online
October is the National Cybersecurity Awareness Month (NCSAM) aimed towards raising awareness about the importance of cybersecurity and sharing the knowledge and resources needed to stay secure while connected. This year’s theme is “Do Your Part. #BeCyberSmart” and we, of course, want to do our part.
Subdomain-Enum: Enumerating Subdomains with the SecurityTrails API™
One of the core products at SecurityTrails is our API. And to ensure that its usage is simple and user-friendly, we strive to follow industry best practices and standardization that the user base will be familiar with.
Residential Evil: Addressing the Role of Anonymization Infrastructure in Cybercrime with Tom Kilmer from Spur
In recent years, more emphasis is put on privacy concerns and data security while online. The shields at the forefront of this battle for privacy and secure internet access are VPNs and proxies, and more notably residential IP proxies. While claiming to offer anonymization to users, residential proxies also account for some security issues.
October Product Updates: Downloads, Host Page Improvement, Egress traffic, and more.
We are thrilled to announce new features for SurfaceBrowser™, our SecurityTrails API™, and Console.
#ProTips: Understanding a Leaky Internet with Gregory Boddin
Over the past few years, data breaches involving millions of leaked records have become the norm. A common offender we’re seeing more of is the presence of poorly secured and misconfigured databases connected to the Internet.
The Equinix Attack: Understanding Ransomware Behaviour
According to the United State’s Cybersecurity and Infrastructure Security Agency (CISA), the number of ransomware attacks around the world has increased, and the Computer Emergency Response Team (US-CERT) states that this sort of breach hits a target every 14 seconds.
Reblazing Web Security, Announcing a New Product, and Listening to Records with Tzury Bar Yochay from Reblaze
Web applications contain sensitive data like user information, financial data, and intellectual property. That data is valuable and alluring to malicious attackers. Cyber attackers looking for vulnerabilities and weak spots to gain unauthorized access for stealing data keep web applications under constant threat.
SSL/TLS History: Discovering Service Encryption
Privacy in peer-to-peer communications throughout the World Wide Web has become an extremely widespread issue, especially over the last few years.
Cats, Board Games, and Analyst-Centric Threat Intelligence: Speaking with Pulsedive Co-founders Dan Sherry and Grace Chi
Two heads are better than one, and the same rings true when starting a company. You can have the idea, the entire business plan set out, the drive and desire needed, but there might be something missing. This is where most founders turn their focus to the search for a perfect co-founder. A co-founder that complements their skills, helps them turn their ideas into reality, brings a fresh perspective, and is there to support them.