Top 10 Cybersecurity Legends You Should Know About
Cybersecurity is growing quickly and it might seem difficult to keep up with all the latest developments and trends. But there are some trends—or better yet, people—who have left their unmistakable imprint on the history of cybersecurity.
Domain Security & Solutions, Part 2: Phishing & Trademark Infringement Attacks
Millions of emails are sent every day, and a few of them will surely hit your inbox. Apart from your personal, notification and corporate emails, you’ll undoubtedly be asked to open emails from “companies” inviting you to update your account’s personal details with a certain bank, or with other popular online services such as Google, Apple or Dropbox.
Top 10 Cyber Attack Maps for Visualizing Digital Threat Incidents
A new study by Bromium shows that digital crime revenue has grown to $1.5 trillion dollars annually in illicit profits. Popular websites including GitHub, EA and many others face bigger, more sophisticated attacks every day, falling victim to the growing trend of cybercrime.
Where You’ll Find Us: An Overview of SecurityTrails Integrations
Last week, we were excited to share the news about our latest SecurityTrails integration: the YETI Analytics plugin. Now it’s time to recap all the SecurityTrails integrations and tools currently using our intelligence platform.
YETI Analytics Plugin for SecurityTrails
We’ve written about past integrations with our powerful API before, most recently about our latest R language integration. Today we’re excited to show you a new SecurityTrails API integration. This time it’s one written by Manabu Niseki, and it’s specifically a plugin for the YETI platform.
New SecurityTrails API integration with R programming language
Since our beginning, we always believed that a good API service was fundamental to offer the best possible solution for developers and entrepreneurs.
SecurityTrails Engineering: Major Updates to our Domain Discovery Pipeline
We’ve made major engineering advancements in the process of locating domains that are normally hard to obtain. We’ve developed an autonomous system that allows us to process 10s of TBs of data daily, to find domains and subdomains from numerous sources, verify them and then add all those domains to our database.
New API Scroll Endpoint + Return IPs Feature Available
Here at SecurityTrails, we’re making our products smarter, stronger and easier to use every day. Thanks to valuable customer feedback and bold ideas from our own engineering and product management team, we are now introducing two new features to our powerful domain and IP intelligence API.
What is Passive DNS? And Why Should You Use a Passive DNS API?
Cybersecurity attacks and network threats are on the rise every year. Even if you’re not aware of it, the bad guys are always lurking in the background, looking for ways to attack your web server, DNS infrastructure and domain names.
Using SecurityTrails free API tier for Bug Bounty programs
Bug bounty programs are pretty popular in the software developer communities around the world. The way it works is pretty simple: developers find and report bugs to the company who owns and runs the software, and get recognition and, in most cases, a compensation for that useful help.