Is Your Company Part of a Scam Campaign? (Zoom Showcase)
“Our team was working like any regular day, drinking some coffee, checking emails, answering tickets, when suddenly a stunning bell noise was heard and a red alarm popped out in our dashboard… the AI-based script we launched last week detected several suspicious domain names being registered that looked very similar to ours…”
Domain Security & Solutions, Part 4: How to Protect your Account at your Registrar
Not all entrepreneurs and developers are truly aware of the implications of losing a domain name. That’s why keeping it secure has to be one of your top priorities when running a company or business with an online presence.
How to Find Associated Domains and Domain WHOIS Information Using SurfaceBrowser™
In previous articles, we’ve shown you some of the powerful features of our enterprise-grade product SurfaceBrowser™, such as How to analyze SSL certificates. We’ve also written about the new Explore feature, that allows you to jump between different data-sets of information from our intelligence database. Today we will dig into two additional features: SurfaceBrowser™ Associated Domains and WHOIS historical information.
Domain Tools: top DNS, IP and Domain utilities to investigate any website
Domain names are one of the top things you will check when it comes to a cybersecurity investigation. They are the key to open a treasure trove that, when analyzed correctly, may reveal deep secrets about the company, individuals, servers, IPs, network technology and DNS zones behind the TLD.
WHOIS History: The Importance of WHOIS Records in the Infosec Industry
Domain names are collectively one of the most essential components of the Internet. Without them we wouldn’t be able to send an email, connect to social networks and of course, browse any web pages available on the net.
DNS Forensic Analysis Using Domain History API and DNS History API
DNS allows IP addresses’ numbers to be converted into human-readable domain names, letting us browse the internet or send emails without knowing what’s behind the scenes. Domain names are easy to use on any online service, and they work pretty well for all kind of web-based products.
Why Should I Perform a DNS Audit?
DNS auditing is a critical task when it comes to infrastructure and system administration. Ironically, it’s also one of the most underrated internet services available, often overlooked when someone is performing IT auditing tasks.
What Are Certificate Transparency Logs?
SecurityTrails has introduced to you our new Feeds page, SurfaceBrowser™, and the option of getting certificate transparency logs, all of them in unified format so you’re able to extract any information needed. And while Google has announced they’ll be requiring Certificate Transparency for all newly-issued publicly trusted certificates, highlighting transparency and accountability through Certificate Authorities, there are still people who don’t get the importance of Certificate Transparency logs and the value of the information within them.
DNSSEC – What Is It? Why Is It So Important?
The Domain Name System (DNS) is one of the most popular Internet services in use, and at the same time, it’s among the most complex. Without DNS we couldn’t resolve hostnames into IP addresses. Domains themselves are hugely popular as well, as anyone can register a domain name to start an online business.
Preventing Domain Hijacking – 10 Steps to Increase your Domain Security
OS Server daemons (also known as services), as well as applications, always require security hardening to prevent remote attacks. Previously we posted two great articles about server hardening: How to prevent DNS Attacks and another one dedicated to increasing your SSH Server Security. However, your entire online business can suffer if you neglect another key part of every Internet business: your domain name.