OWASP Amass: A Solid Information Gathering Tool
Throughout history, human beings have crafted tools as a way to improve people’s lives. From stone hammers to metal knives, through advancements from rudimentary medical instruments to breakthroughs made with industrial steam machinery.
Finding Coronavirus Malicious Domain Names
The coronavirus outbreak (COVID-19) is arguably one of the most widely publicized events of the century. Information surrounding this pandemic has been incredibly spare, provoking a true “infodemic” through the spread of unhelpful related content like jokes, doubtful home prevention treatments and viral fake videos, along with useful and accurate information as well.
Top 5 Nmap Online Alternatives
While working with a terminal on Unix or Linux can feel like the better part of driving a manual car, with the vehicle’s full power in your hands and the sense you get of old-fashioned control, some people prefer the automatic variety. These people want an easier experience, with something that simply “works” while doing much of the work for you.
Whois History: How to Check the Domain Owner History
Last week, we published an interesting topic about newly registered domain names, and how monitoring these could help the infosec industry investigate malicious incidents such as malware, viruses and phishing campaigns.
IP Intelligence: The Fuel Behind Modern Cybersecurity
We’ve published a lot of articles that involve the ‘intelligence’ topic, because it’s one of the most requested subjects for both blue and red teams. And despite what many non-technical people may think, cybersecurity isn’t only defined by DDoS attacks, massive defacing, and other popular types of cyber crime, it’s also defined by intelligence data.
6 Tips to Harden Your HTTP Headers
Web-based attacks are one of the most common types of cybercrime, and in most cases, the attacked protocol is the HTTP, while the component that receives the attacks is the web server.
Top 15 OSINT Web Browser Extensions
OSINT stands for Open Source Intelligence, as explained in our previous article What is OSINT? At that time, we learned about the concept of OSINT, how to make use of it, and its most popular techniques.
Two-Factor Authentication vs. Multi-Factor Authentication: Differences Explained
The number of people who rely on weak passwords such as “Password1234” has long been worrisome, so it’s no surprise that stolen credentials are one of the most common causes of data breaches. Even a more complex password can’t guarantee safety from cyber attacks.
Information Gathering: Concept, Techniques and Tools explained
“Information is power,” as the saying goes. And in most scenarios it’s true: having critical information, at the right time, and especially knowing how to use it, can be a great source of power.
What is CVE? - Common Vulnerabilities and Exposures
In May 2017, WannaCry, a strain of ransomware, spread quickly around the world. It managed to affect National Health Service hospitals in England and three companies in Spain and reached many other countries including Russia, France and Japan.