Introducing the Palo Alto Networks Cortex XSOAR + Attack Surface Intelligence Integration
We are super excited to announce the immediate availability of our Palo Alto Cortex XSOAR + Attack Surface Intelligence integration.
Exploring the Attack Surface Intelligence and Tines integration
A few days ago we happily announced the immediate release of our Risk Rules API + the integration with Tines, the popular platform designed to help security and ops teams automate manual workloads.
Maltego's Standard DNS Transforms: Now Powered by SecurityTrails
Today we are happy to announce that SecurityTrails is now powering Maltego DNS investigations on their popular Standard Transforms. This means that now you can use your current SecurityTrails API key to enrich your DNS-based research.
SecurityTrails has been acquired by Recorded Future
We at SecurityTrails are thrilled to announce that we have been acquired by our long-standing partner, Recorded Future.
SecurityTrails Year in Review 2021
After 2020, a year of unprecedented change and revelation, and with the whole world facing a multitude of challenges, we entered 2021 colored in a fresh layer of optimism, confidence and defiance.
Introducing Single Sign-On to SecurityTrails: Secure Authentication with Okta SSO
We are excited to announce that we are beginning the implementation of single sign-on (SSO) access across SecurityTrails. Okta SSO is the first provider we’re bringing on in this effort to deliver secure authentication and a better user experience to our users.
Palo Alto Networks Cortex XSOAR now has access to The Total Internet Inventory. ™
SecurityTrails' 125,000 users can now integrate with the leading SOAR platform.
SecurityTrails Year in Review 2020
The year is almost over, can you believe it? And 2020 has been one heck of a year. With so many ups and downs, we can all agree to breathing a sigh of relief once its end was in sight. Yet however the year treated us, we’d like to acknowledge many good moments and memories made.
Declaring War on Surface Area Sprawl
SecurityTrails got a big gut check at the beginning of last week. One of our Elasticsearch servers was unintentionally left open when an engineer was trying to fix an outage. This caused a series of self inflicted drama.
Incident: Re-generate API keys due to open Elasticsearch server
TL;DR: On Monday, June 29, 2020 we were notified by a security researcher that one of our Elasticsearch clusters was exposed to the Internet without any authentication. The configuration issue is resolved, but API usage logs may have been exposed.