Top 7 IP Scanner Tools for Network Mapping
IP scanning, or IP mapping, is one of the oldest and most traditional tasks performed by people in all types of IT roles, from system administrators and network engineers to security researchers. When you’re working with a company with a large number of connected networks, managing all that IP address allocation could be somewhat tricky.
Social Engineering: What Is It? Types of Social Engineering Attacks and How to Protect Yourself from Them
With human error being the top cause of data breaches¹ in all kinds of organizations, it isn’t surprising that a type of cyber attack that exploits human psychology would be one of the most common threats to enterprise security we see.
Domain Security & Solutions, Part 4: How to Protect your Account at your Registrar
Not all entrepreneurs and developers are truly aware of the implications of losing a domain name. That’s why keeping it secure has to be one of your top priorities when running a company or business with an online presence.
DNS Root Servers: What Are They and Are There Really Only 13?
The Domain Name System is one of the most important internet services in existence, without which we wouldn’t be able to access any online content or even send an email. In fact, every time we try to connect to a website or any other online service, DNS root servers help our computers find and reach the desired addresses.
Domain Security & Solutions, Part 3: Stale DNS Records & Subdomain Takeover Attacks
Since the beginning, the Internet has been powered by servers. Going back a few decades, most companies used bare metal servers. Then came VPS servers, which allowed people to run virtual operating systems in a single dedicated server with different applications, database technologies, and more.
Cloudflare shutting down 8chan: the Internet shelter for hatred
This morning we were surprised by the recent news announcing that Cloudflare is going to shut down the popular website 8chan (8chan.net) from their infrastructure.
Top 10 Cybersecurity Legends You Should Know About
Cybersecurity is growing quickly and it might seem difficult to keep up with all the latest developments and trends. But there are some trends—or better yet, people—who have left their unmistakable imprint on the history of cybersecurity.
Domain Security & Solutions, Part 2: Phishing & Trademark Infringement Attacks
Millions of emails are sent every day, and a few of them will surely hit your inbox. Apart from your personal, notification and corporate emails, you’ll undoubtedly be asked to open emails from “companies” inviting you to update your account’s personal details with a certain bank, or with other popular online services such as Google, Apple or Dropbox.
Know Your Assets: Talking with Jonathan Cran from Intrigue
The constant risk of cyberthreats on organizations and their digital landscapes makes knowing your assets and the extent of your attack surface crucial. Reconnaissance is one of the first steps attackers will take to discover any unprotected and unmonitored assets, and use them as means to gain access to your network.
Domain Security & Solutions – Part 01: Cybersquatting & Copyright Infringement
When we think about cyber attacks and general network threats, we usually imagine massive flood attacks, SQL injections and web application vulnerabilities.