WHOIS History: The Importance of WHOIS Records in the Infosec Industry
Domain names are collectively one of the most essential components of the Internet. Without them we wouldn’t be able to send an email, connect to social networks and of course, browse any web pages available on the net.
Analyzing SSL Certificates with SurfaceBrowser
SSL certificates have been in use for decades, but in recent years we’ve seen a tremendous boost in SSL orders from all the major providers. Nowadays, SSL certificates play a critical role in the cybersecurity industry.
OpSec: A Vital Part of Any Cybersecurity Program
We all have something to hide. Even though humans are social beings, there are some things we want to keep to ourselves, and it’s been like that since the beginning of humankind.
OSINT Framework: The Perfect Cybersecurity Intel Gathering Tool
Intel and reconnaissance are among the first steps taken in any cybersecurity research effort, and as we’ve seen in our previous post, OSINT plays a big role in data collection. So what is OSINT?
The Top 5 Best DNS Servers for improving Online Privacy & Security
We recently ran two Twitter polls to ask what you thought the best DNS servers were in terms of online privacy and security.
What is Passive DNS? And Why Should You Use a Passive DNS API?
Cybersecurity attacks and network threats are on the rise every year. Even if you’re not aware of it, the bad guys are always lurking in the background, looking for ways to attack your web server, DNS infrastructure and domain names.
Top 9 Popular OSINT Facebook Tools
We hope you enjoyed the article we wrote about OSINT a while back, which explored the meaning of the term, the history behind the concept and the ease with which one can use it — even without knowing too much about it. We also explored the most popular OSINT Tools you can use on any information security investigation.
Data Intelligence: What is it and why is it so important?
The process of digital transformation has brought us many new developments, and more businesses are becoming data-driven as they are not only able to monetize that data directly, but can also utilize it for future decision-making.
Cybersecurity Red Team Versus Blue Team — Main Differences Explained
When discussing cybersecurity, the terms “Red team” and “Blue team” are often mentioned. Long associated with the military, these terms are used to describe teams that use their skills to imitate the attack techniques that “enemies” might use, and other teams that use their skills to defend. In cybersecurity, there isn’t much difference.
Top 25 Kali Linux Penetration Testing Tools
Kali Linux is an open source distribution based on Debian focused on providing penetration testing and security auditing tools. Actively developed by Offensive Security, it’s one of the most popular security distributions in use by infosec companies and ethical hackers.