Announcing our SecurityTrails + Phantom app integration
Some time ago we wrote about our SecurityTrails Splunk plugin - and today, we are super excited to announce the immediate availability of a new integration: SecurityTrails for Phantom.
Cryptojacking campaigns continue to target vulnerable websites
Over the last seven months, we've witnessed a large growth in malicious cryptocurrency mining operations. This activity, commonly known as cryptojacking, steals the computational (CPU) resources of victims' device to mine cryptocurrency.
Spiderfoot, an Open Source Intelligence Automation Tool
Some time ago we mentioned the cool integration of our security platform into Spiderfoot, one of the best reconnaissance and threat intelligence tools around. Today, we are going to tell you a little bit more about this fantastic security tool.
Top 5 Best Port Scanners
Port scanners are some of the most useful tools when you are starting your security investigation on any remote or local network. Let's explore the top five most popular port scanners tools used in the infosec field.
Top 20 Data Reconnaissance and Intel Gathering Tools
When you start an IT security investigation, the first phase you will face is the data reconnaissance and intel gathering about your target. Once you finish gathering information about your objective you will have all the needed information like IP addresses, domain names, servers, technology and much more so you can finally conduct your security tests.