Proactive Threat Hunting: Techniques to Identify Malicious Infrastructure
Learn how to hunt malicious infrastructure using SSL certs, favicons, HTTP headers, JARM, and IoT search engines like Netlas, Shodan, and Censys.
July 30, 2025
→The Pyramid of Pain: Beyond the Basics
Despite its simplicity, the Pyramid of Pain is a powerful concept that shifts your mindset toward proactive defense. Let’s explore how it works in practice.
July 25, 2025
→SOCMINT: Intelligence in the Social Media Era
How does Social Media Intelligence differ from OSINT? A review of the most popular SOCMINT tools, their true capabilities, and a few real-world cases.
July 23, 2025
→Hannibal Stealer vs. Browser Security
How Hannibal Stealer bypasses modern browser protections to steal cookies and credentials, with deep insights into Chrome v20 encryption and evasion techniques.
July 18, 2025
→The Largest Data Breach Ever? How Hackers Stole 16 Billion Credentials
Hackers leaked 16B credentials from malware logs and past breaches. Learn what was stolen, who’s at risk, and how to check if your data is exposed.
July 9, 2025
→AI-Driven Attack Surface Discovery
Can large language models assist in attack surface mapping? We put them to the test using the Netlas Discovery API in a hands-on classification experiment.
June 20, 2025
→Complete Guide on Attack Surface Discovery
A comprehensive approach to mapping your attack surface, helping you identify vulnerabilities, assess risks, and implement effective security measures.
October 9, 2024
→Using DNS History in Cybersecurity
A detailed guide on how to use DNS History in cybersecurity. Use cases, best tools, and best practices.
August 30, 2024
→Best Attack Surface Visualization Tools
Explore top tools that help visualize your attack surface, enabling better threat detection and improved security posture for your organization.
July 13, 2024
→