Is Blockchain Secure?
We know how vulnerable we are on the Internet — from the very day it was created, attackers have been trying to compromise the safety of its users and the confidentiality of their data.
Top 15 Nmap Commands to Scan Remote Hosts
Nmap is one of the most popular network mappers in the infosec world. It’s utilized by cybersecurity professionals and newbies alike to audit and discover local and remote open ports, as well as hosts and network information.
Is WordPress Secure?
WordPress is one of the most high-profile open source CMS's in use today. Being that 60% of all CMS websites use Wordpress, and 31% of all websites on the Internet use it, it's safe to say that it's a frequent target of security exploits.
What is OSINT? How can I make use of it?
In the past months, we have reviewed a couple interesting OSINT utilities. In fact, a few weeks ago, we also published the Top 20 OSINT Tools as a great resource for everyone starting an information security investigation. But one thing is missing for all those who have just been introduced to the fascinating world of cybersecurity: the key concept of OSINT.
Announcing our SecurityTrails + Phantom app integration
Some time ago we wrote about our SecurityTrails Splunk plugin - and today, we are super excited to announce the immediate availability of a new integration: SecurityTrails for Phantom.
Cryptojacking campaigns continue to target vulnerable websites
Over the last seven months, we've witnessed a large growth in malicious cryptocurrency mining operations. This activity, commonly known as cryptojacking, steals the computational (CPU) resources of victims' device to mine cryptocurrency.
Spiderfoot, an Open Source Intelligence Automation Tool
Some time ago we mentioned the cool integration of our security platform into Spiderfoot, one of the best reconnaissance and threat intelligence tools around. Today, we are going to tell you a little bit more about this fantastic security tool.
Top 5 Best Port Scanners
Port scanners are some of the most useful tools when you are starting your security investigation on any remote or local network. Let's explore the top five most popular port scanners tools used in the infosec field.
Exploring Microsoft Subdomains
Using SecurityTrails to explore subdomains inside popular companies is one of our favorite pastimes: you never know what you will find. And no matter if we are exploring giant agencies or companies, as covered in FBI subdomains and Google subdomains, or small IT companies: you can always find some gems.
Exploring Google DNS zone, record by record
Days ago playing with DNSTrails we discovered some new gems to share with you, this time from Google.com. Let’s explore the list.