This Threat Intelligence PowerShell Sample Code demonstrates querying the SSL Certificates Chain API service via the Threat Intelligence Platform. The Threat Intelligence SSL Certificates Chain API allows you to get detailed information about an SSL Certificate and the complete SSL Certificates chain, for a given domain name. The data is provided in JSON format and returns an ordered collection of all SSL certificates present in the SSL Certificates chain. The Threat Intelligence API’s provide a way to integrate intelligence analysis insights, using Threat Intelligence data sources to gain knowledge of the target host and crucial threat detection for any system.
E-HAWK, cyber intelligence provider focused on combating fraudulent sign ups, has released the Vetting API Connector. The API automates the various vetting tools E-HAWK has deployed to analyze sign ups to determine the risk of fraud. The technology analyzes risk by vetting IP address, email, phone number, location, device and more. Based on risk levels, companies utilizing E-HAWK tools can set automatic responses to fraudulent activity.
The COVID-19 pandemic is causing many businesses to turn to their mobile apps for survival. Development teams are under more pressure than ever to deliver new and updated apps while cybercriminals are responding with more advanced, targeted attacks. App security is now more critical then ever.
Today at Google I/O, the company highlighted key updates to the API that will allow developers to fine tune the way that end users interact with authentication prompts, as well as providing new tools for recognizing device compatibility.