Attack Surface: Concept, Types, Tools and Attack Surface Reduction Strategies
A while back we talked about the concept of OSINT, and how important it is to the infosec industry.
What is OSINT? How can I make use of it?
In the past months, we have reviewed a couple interesting OSINT utilities. In fact, a few weeks ago, we also published the Top 20 OSINT Tools as a great resource for everyone starting an information security investigation. But one thing is missing for all those who have just been introduced to the fascinating world of cybersecurity: the key concept of OSINT.
How to use reverse DNS records to identify mass scanners
Search engine crawlers, botnets, and mass scanners are constantly probing the entire IPv4 space of the internet. Determining which incoming traffic is “friendly” is an ongoing task for network administrators and information security professionals.
Top 5 Wordpress Vulnerability Scanners
In the past blog posts we've been writing about OSINT Tools, and also about how to prevent DNS attacks when you are running your own DNS servers, and today we are focusing on Wordpress Security.
URLScan.io: the best way to scan any website
Intel gathering and data reconnaissance are one of the first steps in any security investigation. There are a lot of OSINT tools to use in your daily infosec tasks — and we will keep sharing our best tools with you.
Announcing our SecurityTrails + Phantom app integration
Some time ago we wrote about our SecurityTrails Splunk plugin - and today, we are super excited to announce the immediate availability of a new integration: SecurityTrails for Phantom.
Cryptojacking campaigns continue to target vulnerable websites
Over the last seven months, we've witnessed a large growth in malicious cryptocurrency mining operations. This activity, commonly known as cryptojacking, steals the computational (CPU) resources of victims' device to mine cryptocurrency.
Spiderfoot, an Open Source Intelligence Automation Tool
Some time ago we mentioned the cool integration of our security platform into Spiderfoot, one of the best reconnaissance and threat intelligence tools around. Today, we are going to tell you a little bit more about this fantastic security tool.
Top 5 Best Port Scanners
Port scanners are some of the most useful tools when you are starting your security investigation on any remote or local network. Let's explore the top five most popular port scanners tools used in the infosec field.
Top 20 Data Reconnaissance and Intel Gathering Tools
When you start an IT security investigation, the first phase you will face is the data reconnaissance and intel gathering about your target. Once you finish gathering information about your objective you will have all the needed information like IP addresses, domain names, servers, technology and much more so you can finally conduct your security tests.