What is OSINT? How can I make use of it?
In the past months, we have reviewed a couple interesting OSINT utilities. In fact, a few weeks ago, we also published the Top 20 OSINT Tools as a great resource for everyone starting an information security investigation. But one thing is missing for all those who have just been introduced to the fascinating world of cybersecurity: the key concept of OSINT.
How to use name server records to locate malicious domains en masse
Malicious domains often come in the form of phishing sites looking to steal usernames, passwords, and other sensitive information by impersonating a well-known brand. Mitigating phishing threats requires constant attention by information security teams. In this post we’ll demonstrate the value of DNS records, specifically name server (NS) records to locate phishing and other malicious sites en masse.
Mitigating SSH based attacks – Top 15 Best SSH Security Practices
SSH is one of the most popular communication protocols on the Internet. It's widely used by developers, webmasters, and sysadmins. It allows you to gain remote access to your new Cloud or Dedicated box in just seconds using an encrypted communication channel.
New Features: Redesigned Console and API Usage Log
We at SecurityTrails are devoted to always improving and making your experience as smooth and user-friendly as possible. New and improved API Console does not only have a new appearance, but it is now accompanied with new feature – API Usage Log.
Firefox DNS over SSL and Cloudflare public resolvers: What you need to know
The net neutrality is dead. It is sad, but true. With this new regulation, ISPs are able to manage customer traffic as they like, and this has raised many questions and concerns over users privacy in the past months.