Subfinder: A Practical Subdomain Exploration Tool
In one of our previous posts about information gathering, we covered the basics on how to get the right intel information about any organization, and that of course includes DNS intelligence.
Cyber Espionage: Cloak-and-Dagger in Cyberspace
Spies and the world of espionage have been around since the beginning of time. Information has always been power; even our predecessors knew it.
All Things Quantum - Quantum Security Series - Part 3
Secrets are no longer secret. Communications have been breached. Information exchange is no longer safe. Digital apocalypse has arrived on the scene.
Random and Mysterious - Quantum Security Series - Part 2
Last week we scratched the surface of what quantum information and quantum security are, saw how current encryption algorithms could be broken and explored how to secure a classical SSH protocol tunnel to make it quantum attack resistant.
A game changer technology - Quantum Security Series - Part 1
It’s 3 a.m. and there’s an odd latency increase that lags all your web services. Your cloud provider says “it’s all good”, your Internet Service Provider has no obvious issues, but something is wrong with the path… then after 15 minutes your entire traffic suddenly and magically returns to normal, latency dropped and somehow there wasn’t any service disruption.
APT Security: What Are Advanced Persistent Threats?
In November 2014, Sony Pictures publicly disclosed that their systems had been breached, and that large amounts of internal corporate data—including executive emails, the personal information of past and present employees, and previously unreleased movies—were made available for illegal download.
Top 5 Password Managers to Keep Your Accounts Safe
Most of us have a number of online accounts, and often fall into a rut of reusing the same password for some, if not all, of them. Convenience aside, having a strong password provides critical protection from cyber attacks—as one of the most common ways hackers break into systems is by merely guessing at passwords.
Ransomware Attacks: What They Are, Common Types and How to Protect Yourself
It’s no wonder ransomware is one of the most feared types of cybercrime out there. The idea of being denied access to your system or personal files and having them held under ransom by a malicious attacker is one of the worst scenarios most of us can imagine.
Mobile Security 101: Common Threats and How to Protect Yourself Against Them
Even with an estimated 5 billion people currently possessing a mobile device, half of them being smartphones, the use of mobile technology is still growing rapidly throughout the entire world.
The Social Engineering Toolkit
In the cybersecurity world, there are many types of attacks and network threats. And among the most popular are social engineering attacks.