Newly registered domain feeds
In the current digital era, information is power, and the Internet is run by two main things: domain names and IP addresses. Without both, there would be is no way to reach online services.
Cyber Counterintelligence: When Defense Alone is No Longer Sufficient
“The best defense is good offense” is a saying that can be applied to many fields: military, games, business… and cybersecurity. However, the standard ‘defense-only’ approach many organizations have been taking is simply not sufficient for dealing with the current threat landscape. And just as intelligence services keep an eye on terrorists to stop them before they attack, organizations should move towards adopting the offensive approach to protect their infrastructure and systems.
IP Intelligence: The Fuel Behind Modern Cybersecurity
We’ve published a lot of articles that involve the ‘intelligence’ topic, because it’s one of the most requested subjects for both blue and red teams. And despite what many non-technical people may think, cybersecurity isn’t only defined by DDoS attacks, massive defacing, and other popular types of cyber crime, it’s also defined by intelligence data.
The Purple Team: What It Is and How Your Organization Can Benefit from Having One
Regardless of the size and the industry of an organization, one of the most effective ways to discover infrastructure vulnerabilities and thwart possible cyber threats is to rely on the expertise of both red teams and blue teams.
Ransomware Attacks: What They Are, Common Types and How to Protect Yourself
It’s no wonder ransomware is one of the most feared types of cybercrime out there. The idea of being denied access to your system or personal files and having them held under ransom by a malicious attacker is one of the worst scenarios most of us can imagine.
Top 10 Cybersecurity Blogs to Follow in 2020
Whether you’re a security professional, looking to pursue a career in this industry, or simply interested in the current security and threat landscape—and its societal, cultural and political impact—cybersecurity blogs are often the best source of information you can find online.
6 Tips to Harden Your HTTP Headers
Web-based attacks are one of the most common types of cybercrime, and in most cases, the attacked protocol is the HTTP, while the component that receives the attacks is the web server.
What’s New at SecurityTrails: New Domain SSL, IP WHOIS and IP User Agent API Endpoints
Today, we are sharing the release of new API endpoints to fetch SSL certificate information for hostnames, IP WHOIS contacts and abuse information as well as User Agent information for IP addresses. In addition to the new API endpoints we have also updated our Console. Check out the full Changelog which is updated whenever we roll out new changes.
Security Through Obscurity
When you work as a system administrator, one of your main tasks is to keep your systems secure, and that includes applying system package updates, kernel patching, disabling unnecessary services, installing IDs and firewalls, and many other things.
Top 8 Exploit Databases for Security Researchers
Vulnerabilities are found every day, and they don’t discriminate from one operating system to another. They’re present on all operating systems used on electronic devices, from mobile phones to smart TVs, from the IoT to computers.