DNS Forensic Analysis Using Domain History API and DNS History API
DNS allows IP addresses’ numbers to be converted into human-readable domain names, letting us browse the internet or send emails without knowing what’s behind the scenes. Domain names are easy to use on any online service, and they work pretty well for all kind of web-based products.
Top 5 Ways to Handle a Data Breach
With data breaches occurring regularly, people have become desensitized to them. This isn’t good, since the protection of data has never been more important. Not only are business required to announce that a data breach has occured, they are also obligated to pay fines due to regulations in accordance with GDPR.
How to Improve Your Cyber Insurance Underwriting
Cyber attacks can and do happen, and they happen all the time. There are all kinds of different attacks and threats you can encounter on the Internet, to the extent that we’ve even written about the most common network security threats. This has inevitably led to cyber risk coverage as an important and growing market.
SurfaceBrowser: a Passive Intelligence Tool for Exploring the Surface of Any Company
A few weeks ago we launched our new IP, Domain and Company Enrichment Feeds, and today we’re excited to show you one of the most robust information gathering utilities available on the Internet.
An Ode to White Hats: What Is Ethical Hacking?
The first thing that comes to mind when people hear a word “hacker” is some sort of criminal, someone we should be scared of when browsing the Internet. This shouldn’t worry true professionals, the “white hats”, as the number of people who understand the importance of their role in Internet safety just keeps growing. But the question remains: What is an ethical hacker?
Why Should I Perform a DNS Audit?
DNS auditing is a critical task when it comes to infrastructure and system administration. Ironically, it’s also one of the most underrated internet services available, often overlooked when someone is performing IT auditing tasks.
What Are Certificate Transparency Logs?
SecurityTrails has introduced to you our new Feeds page, SurfaceBrowser™, and the option of getting certificate transparency logs, all of them in unified format so you’re able to extract any information needed. And while Google has announced they’ll be requiring Certificate Transparency for all newly-issued publicly trusted certificates, highlighting transparency and accountability through Certificate Authorities, there are still people who don’t get the importance of Certificate Transparency logs and the value of the information within them.
Is Blockchain Secure?
We know how vulnerable we are on the Internet — from the very day it was created, attackers have been trying to compromise the safety of its users and the confidentiality of their data.
Top 15 Nmap Commands to Scan Remote Hosts
Nmap is one of the most popular network mappers in the infosec world. It’s utilized by cybersecurity professionals and newbies alike to audit and discover local and remote open ports, as well as hosts and network information.
Is WordPress Secure?
WordPress is one of the most high-profile open source CMS's in use today. Being that 60% of all CMS websites use Wordpress, and 31% of all websites on the Internet use it, it's safe to say that it's a frequent target of security exploits.