The Power of Being a Misfit: Speaking with Fredrik Alexandersson STÖK
Have you ever noticed some of the most creative thinkers and individuals seem to be misfits? There is power in being a misfit — being different, thinking creatively and outside the box, and rejecting established norms. Misfits are also frequently part of the counterculture.
How to Query Massive Port Scan Data with the SecurityTrails API™
The most important part of both bug bounty hunting and security research is the ability to find vulnerabilities quickly, before an attacker can take advantage of them.
SecurityTrails Secures Funding from Prominent Security Tech Leaders
Today we’re sharing with you that we raised funding to accelerate growing SecurityTrails and building The Total Internet Inventory™ . We’ve assembled and are grateful for this awesome group of investors who are supporting our product-led strategy:
Mentoring the Upcoming Generation of Bug Bounty Hunters with Hakluke
We are in a time where global economies are screeching to a halt while cybercrime is not resting. With cybercrime predicted to inflict damages totaling $6 trillion in 2021, its rise has outraced traditional security teams and methodologies, making it harder to detect, mitigate, and resolve an escalating number of threats.
How to Find Associated Domains and IP Neighbors with the SecurityTrails API™
It has long been argued that a carefully-planned initial OSINT strategy favors the outcome of the remaining engagement.
Giving Back to the Community with Ben Bidmead aka pry
Collaboration and human connection are significant trends in cybersecurity. A vast and fluctuating cyber threat landscape means new challenges and vulnerabilities are always just around the corner. Sharing knowledge, techniques, and skills empowers cybersecurity professionals and practitioners to thwart cyber-attacks and minimize risks.
IP Reconnaissance for Bug Bounty Hunters with SurfaceBrowser™
IP reconnaissance is often the base and a starting point of any security research or bug hunt. This is simply because scanning any IP address can lead you to an individual host in question—and once you’ve found the host, the possibilities are limitless. From there you may find running services, open ports, databases, unsecured files and much more. Everything begins with finding and scanning the IP address.
10 Popular Bug Bounty Programs in 2021
Surprisingly, crowdsourced security testing has been around for quite some time. As early as 1995, Netscape Communications Corporation introduced the first technology bug bounty program, “Netscape Bug Bounty”.
Host Discovery Tips for Bug Bounty Hunters with the SecurityTrails API
Despite a growing corpus of dire predictions and research surrounding the state of information security at large, companies continue to expand their digital footprint to encompass a vast array of cutting edge, yet often dissimilar, architectures. From a historical perspective, there is nothing new under the sun at play here; after all, information technology patent citations have steadily dominated those of adjacent industries at least since the 1970s, creating a constant influx of knowledge spillover and innovation that accounts for the exponential growth.
Channeling the Wisdom of the Crowd: Talking with Intigriti’s Stijn Jans and Inti De Ceukelaire
With the boom of data-driven organizations and the adoption of technological advancements, cybersecurity threats are also getting more sophisticated. The fast-changing nature of cybersecurity and the sheer amount of threats and vulnerabilities requires organizations to stay on top of protecting their assets and data from attackers.