The Purple Team: What It Is and How Your Organization Can Benefit from Having One
Regardless of the size and the industry of an organization, one of the most effective ways to discover infrastructure vulnerabilities and thwart possible cyber threats is to rely on the expertise of both red teams and blue teams.
Ransomware Attacks: What They Are, Common Types and How to Protect Yourself
It’s no wonder ransomware is one of the most feared types of cybercrime out there. The idea of being denied access to your system or personal files and having them held under ransom by a malicious attacker is one of the worst scenarios most of us can imagine.
Top 10 Cybersecurity Blogs to Follow in 2020
Whether you’re a security professional, looking to pursue a career in this industry, or simply interested in the current security and threat landscape—and its societal, cultural and political impact—cybersecurity blogs are often the best source of information you can find online.
6 Tips to Harden Your HTTP Headers
Web-based attacks are one of the most common types of cybercrime, and in most cases, the attacked protocol is the HTTP, while the component that receives the attacks is the web server.
What’s New at SecurityTrails: New Domain SSL, IP WHOIS and IP User Agent API Endpoints
Today, we are sharing the release of new API endpoints to fetch SSL certificate information for hostnames, IP WHOIS contacts and abuse information as well as User Agent information for IP addresses. In addition to the new API endpoints we have also updated our Console. Check out the full Changelog which is updated whenever we roll out new changes.
Security Through Obscurity
When you work as a system administrator, one of your main tasks is to keep your systems secure, and that includes applying system package updates, kernel patching, disabling unnecessary services, installing IDs and firewalls, and many other things.
Top 8 Exploit Databases for Security Researchers
Vulnerabilities are found every day, and they don’t discriminate from one operating system to another. They’re present on all operating systems used on electronic devices, from mobile phones to smart TVs, from the IoT to computers.
What is an IoC (indicator of compromise)?
Managing cybersecurity is a never-ending process that involves hardening servers, writing secure code, detecting and responding to known and unknown network security incidents, security auditing, and a very large “et cetera.” All of this is handled by different cybersecurity teams such as system administrators, security operation centers and computer emergency response teams, as well as computer security incident response teams.
Mobile Security 101: Common Threats and How to Protect Yourself Against Them
Even with an estimated 5 billion people currently possessing a mobile device, half of them being smartphones, the use of mobile technology is still growing rapidly throughout the entire world.
SecurityTrails Engineering Retreat: Bali
With all the growth SecurityTrails has been experiencing this past year, and being a fully remote company, many of us have yet to meet all of our fellow team members. When a company is still in its early stages, we tend to put much of our focus on building and perfecting our products. It might feel like there’s no time for anything other than work, but that’s when it’s time for a company retreat: on this occasion, for the entire engineering team!