Top 5 Nmap Online Alternatives
While working with a terminal on Unix or Linux can feel like the better part of driving a manual car, with the vehicle’s full power in your hands and the sense you get of old-fashioned control, some people prefer the automatic variety. These people want an easier experience, with something that simply “works” while doing much of the work for you.
Top 5 Password Managers to Keep Your Accounts Safe
Most of us have a number of online accounts, and often fall into a rut of reusing the same password for some, if not all, of them. Convenience aside, having a strong password provides critical protection from cyber attacks—as one of the most common ways hackers break into systems is by merely guessing at passwords.
How to Check the Domain Owner History
Last week, we published an interesting topic about newly registered domain names, and how monitoring these could help the infosec industry investigate malicious incidents such as malware, viruses and phishing campaigns.
Newly registered domain feeds
In the current digital era, information is power, and the Internet is run by two main things: domain names and IP addresses. Without both, there would be is no way to reach online services.
IP Intelligence: The Fuel Behind Modern Cybersecurity
We’ve published a lot of articles that involve the ‘intelligence’ topic, because it’s one of the most requested subjects for both blue and red teams. And despite what many non-technical people may think, cybersecurity isn’t only defined by DDoS attacks, massive defacing, and other popular types of cyber crime, it’s also defined by intelligence data.
6 Tips to Harden Your HTTP Headers
Web-based attacks are one of the most common types of cybercrime, and in most cases, the attacked protocol is the HTTP, while the component that receives the attacks is the web server.
Top 8 Exploit Databases for Security Researchers
Vulnerabilities are found every day, and they don’t discriminate from one operating system to another. They’re present on all operating systems used on electronic devices, from mobile phones to smart TVs, from the IoT to computers.
What is an IoC (indicator of compromise)?
Managing cybersecurity is a never-ending process that involves hardening servers, writing secure code, detecting and responding to known and unknown network security incidents, security auditing, and a very large “et cetera.” All of this is handled by different cybersecurity teams such as system administrators, security operation centers and computer emergency response teams, as well as computer security incident response teams.
Top 15 OSINT Web Browser Extensions
OSINT stands for Open Source Intelligence, as explained in our previous article What is OSINT? At that time, we learned about the concept of OSINT, how to make use of it, and its most popular techniques.
The Social Engineering Toolkit
In the cybersecurity world, there are many types of attacks and network threats. And among the most popular are social engineering attacks.