What is DNS Intelligence?
We’ve written about the importance of IP addresses before, such as in our article exploring IP intelligence. In that piece we dived into how useful IP data is for the entire internet, as well as the critical role it plays in the cybersecurity industry.
Cyber Counterintelligence: When Defense Alone is No Longer Sufficient
“The best defense is good offense” is a saying that can be applied to many fields: military, games, business… and cybersecurity. However, the standard ‘defense-only’ approach many organizations have been taking is simply not sufficient for dealing with the current threat landscape. And just as intelligence services keep an eye on terrorists to stop them before they attack, organizations should move towards adopting the offensive approach to protect their infrastructure and systems.
IP Intelligence: The Fuel Behind Modern Cybersecurity
We’ve published a lot of articles that involve the ‘intelligence’ topic, because it’s one of the most requested subjects for both blue and red teams. And despite what many non-technical people may think, cybersecurity isn’t only defined by DDoS attacks, massive defacing, and other popular types of cyber crime, it’s also defined by intelligence data.
Cyber Crime Investigation Tools and Techniques Explained
Investigating a crime scene is not an easy job. It requires years of study to learn how to deal with hard cases, and most importantly, get those cases resolved. This applies not only to real-world crime scenes, but also to those in the digital world.
Ripped from the Headlines: Discovered Link Between Jacob Wohl and Surefire Intelligence
SecurityTrails data can be leveraged for many uses, ranging from helping security researchers and companies defend against future attacks with up-to-date data to helping non-technical users discover valuable information about the legitimacy of companies and their domains.
What is OSINT? How can I make use of it?
In the past months, we have reviewed a couple interesting OSINT utilities. In fact, a few weeks ago, we also published the best OSINT Tools as a great resource for everyone starting an information security investigation. But one thing is missing for all those who have just been introduced to the fascinating world of cybersecurity: the key concept of OSINT.
Intelligence collection about your competitors using SecurityTrails, featured by Syed Balkhi
SecurityTrails can be used to discover the future plans of your competitors. See how.