Top 10 Cyber Attack Maps for Visualizing Digital Threat Incidents
A new study by Bromium shows that digital crime revenue has grown to $1.5 trillion dollars annually in illicit profits. Popular websites including GitHub, EA and many others face bigger, more sophisticated attacks every day, falling victim to the growing trend of cybercrime.
Where You’ll Find Us: An Overview of SecurityTrails Integrations
Last week, we were excited to share the news about our latest SecurityTrails integration: the YETI Analytics plugin. Now it’s time to recap all the SecurityTrails integrations and tools currently using our intelligence platform.
YETI Analytics Plugin for SecurityTrails
We’ve written about past integrations with our powerful API before, most recently about our latest R language integration. Today we’re excited to show you a new SecurityTrails API integration. This time it’s one written by Manabu Niseki, and it’s specifically a plugin for the YETI platform.
New SecurityTrails API integration with R programming language
Since our beginning, we always believed that a good API service was fundamental to offer the best possible solution for developers and entrepreneurs.
SecurityTrails Engineering: Major Updates to our Domain Discovery Pipeline
We’ve made major engineering advancements in the process of locating domains that are normally hard to obtain. We’ve developed an autonomous system that allows us to process 10s of TBs of data daily, to find domains and subdomains from numerous sources, verify them and then add all those domains to our database.
New API Scroll Endpoint + Return IPs Feature Available
Here at SecurityTrails, we’re making our products smarter, stronger and easier to use every day. Thanks to valuable customer feedback and bold ideas from our own engineering and product management team, we are now introducing two new features to our powerful domain and IP intelligence API.
What is Passive DNS? And Why Should You Use a Passive DNS API?
Cybersecurity attacks and network threats are on the rise every year. Even if you’re not aware of it, the bad guys are always lurking in the background, looking for ways to attack your web server, DNS infrastructure and domain names.
Using SecurityTrails free API tier for Bug Bounty programs
Bug bounty programs are pretty popular in the software developer communities around the world. The way it works is pretty simple: developers find and report bugs to the company who owns and runs the software, and get recognition and, in most cases, a compensation for that useful help.
SecurityTrails Add-On for Splunk
Days ago we wrote a post where we showed how fast and easy it is to interact with our cool API to retrieve domains, IP addresses, and Whois information. Today, we have some exciting news: The release of an open source SecurityTrails Splunk Add-On.