Subfinder: A Practical Subdomain Exploration Tool
In one of our previous posts about information gathering, we covered the basics on how to get the right intel information about any organization, and that of course includes DNS intelligence.
Cyber Espionage: Cloak-and-Dagger in Cyberspace
Spies and the world of espionage have been around since the beginning of time. Information has always been power; even our predecessors knew it.
Random and Mysterious - Quantum Security Series - Part 2
Last week we scratched the surface of what quantum information and quantum security are, saw how current encryption algorithms could be broken and explored how to secure a classical SSH protocol tunnel to make it quantum attack resistant.
Top 5 Password Managers to Keep Your Accounts Safe
Most of us have a number of online accounts, and often fall into a rut of reusing the same password for some, if not all, of them. Convenience aside, having a strong password provides critical protection from cyber attacks—as one of the most common ways hackers break into systems is by merely guessing at passwords.
Ransomware Attacks: What They Are, Common Types and How to Protect Yourself
It’s no wonder ransomware is one of the most feared types of cybercrime out there. The idea of being denied access to your system or personal files and having them held under ransom by a malicious attacker is one of the worst scenarios most of us can imagine.
Mobile Security 101: Common Threats and How to Protect Yourself Against Them
Even with an estimated 5 billion people currently possessing a mobile device, half of them being smartphones, the use of mobile technology is still growing rapidly throughout the entire world.
The Social Engineering Toolkit
In the cybersecurity world, there are many types of attacks and network threats. And among the most popular are social engineering attacks.
Top 5 Talks from the 36th Chaos Communication Congress
With topics ranging from security, hardware and science to ethics, art and culture, the 36th Chaos Communication Congress delivered a lot of outstanding lectures, and we wanted to share our favorite five.
Open Port Checker Tools
We talk a lot about port scanning tools in this blog. That’s because they play a critical role in the cybersecurity industry.
Top 5 Private Search Engines
There are some things we keep doing, even when we know they’re bad for us. We all know we shouldn’t eat a lot of fast food or live lazy, couch-ridden lives; we all know how bad smoking is, and how miserable we feel the next day when we stay up all night…and yet, we still succumb to those bad habits we just can’t resist.