Newly registered domain feeds
In the current digital era, information is power, and the Internet is run by two main things: domain names and IP addresses. Without both, there would be is no way to reach online services.
Cyber Counterintelligence: When Defense Alone is No Longer Sufficient
“The best defense is good offense” is a saying that can be applied to many fields: military, games, business… and cybersecurity. However, the standard ‘defense-only’ approach many organizations have been taking is simply not sufficient for dealing with the current threat landscape. And just as intelligence services keep an eye on terrorists to stop them before they attack, organizations should move towards adopting the offensive approach to protect their infrastructure and systems.
The Purple Team: What It Is and How Your Organization Can Benefit from Having One
Regardless of the size and the industry of an organization, one of the most effective ways to discover infrastructure vulnerabilities and thwart possible cyber threats is to rely on the expertise of both red teams and blue teams.
Ransomware Attacks: What They Are, Common Types and How to Protect Yourself
It’s no wonder ransomware is one of the most feared types of cybercrime out there. The idea of being denied access to your system or personal files and having them held under ransom by a malicious attacker is one of the worst scenarios most of us can imagine.
What’s New at SecurityTrails: New Domain SSL, IP WHOIS and IP User Agent API Endpoints
Today, we are sharing the release of new API endpoints to fetch SSL certificate information for hostnames, IP WHOIS contacts and abuse information as well as User Agent information for IP addresses. In addition to the new API endpoints we have also updated our Console. Check out the full Changelog which is updated whenever we roll out new changes.
Security Through Obscurity
When you work as a system administrator, one of your main tasks is to keep your systems secure, and that includes applying system package updates, kernel patching, disabling unnecessary services, installing IDs and firewalls, and many other things.
Mobile Security 101: Common Threats and How to Protect Yourself Against Them
Even with an estimated 5 billion people currently possessing a mobile device, half of them being smartphones, the use of mobile technology is still growing rapidly throughout the entire world.
Breaking Cybersecurity Myths
We’re now at a point where cybersecurity is considered an integral part of any business, no matter how big or small. You’d be hard-pressed to find any organization that doesn’t have at least some form of cybersecurity procedures and practices in its business model, and for good reason.
What is Data Center Security? Top 5 Best Practices
Cloud computing and technology have truly revolutionized the way we collect, process and store data. Organizations are increasingly moving their entire infrastructure to the cloud, storing their information in safe, encrypted data centers.
Security Theater: Are You Feeling Secure or Actually Being Secure?
The increase and intricacy of cyber threats show no sign of slowing. Headlines highlight new data breaches almost every day, proving that the need for cybersecurity has never been more apparent than it is right now.