Hot Topics:   Cybersecurity    Domain Names    DNS    Whois    Cybercrime    Brand Protection    Threat Intelligence   

Featured Blogs

My 2023 Broadband Predictions

Doug Dawson This is my annual stab at predicting the major trends in the broadband industry in the coming year... This might be the least brave prediction I think I've ever made. The first iteration of the new map just came out, and there is a lot to like and hate about the new maps. Early reports, like from the State of Vermont, are that the new maps are pretty far off in identifying the locations that can buy broadband. more

Some Random Notes from IETF 115

Geoff Huston The IETF held its 115th meeting in London in November 2022. This was another in the set of hybrid meetings with specific support for online attendees in addition to the normal face-to-face meetings for the week. In no particular order, here are a few of my impressions from the IETF meeting. more

Celebrating 35 Years of the DNS Protocol

Scott Hollenbeck In 1987, CompuServe introduced GIF images, Steve Wozniak left Apple and IBM introduced the PS/2 personal computer with improved graphics and a 3.5-inch diskette drive. Behind the scenes, one more critical piece of internet infrastructure was quietly taking form to help establish the internet we know today. November of 1987 saw the establishment of the Domain Name System protocol suite as internet standards. more

Call for Participation – ICANN DNSSEC and Security Workshop for ICANN76 Community Forum

Dan York Are you doing something interesting with DNS, DNSSEC, or routing security that you would like to share with the larger DNS community at the ICANN 76 meeting in March 2023? If so, please send a brief (1 -- 3 sentence) description of your proposed presentation to [email protected] by the close of business on Friday, 20 January 2023. Are you doing something interesting with DNS, DNSSEC, or routing security that you would like to share with the larger DNS community at the ICANN 76 meeting in March 2023? more

Starlink Now Covers All of Australia

Paul Budde My colleague, Robert Smallwood in Geraldton, WA at the Department of Primary Industries and Regional Development (WA Government), has been testing Starlink now since March 2022 and he reports on his experience and in general, provides updates about Starlink and its mother company, SpaceX. He allowed me to use his report to write this article. more

Businesses Are Ready for the Metaverse

Doug Dawson The latest technology on the horizon is the metaverse, which, stated simply, is the creation of online environments. While the primary focus of the metaverse is to create alternate realities, an application with a possible immediate big uptake is vertical presence for business meetings. Ciena, a manufacturer of fiber optic transmission equipment, recently did a survey worldwide of 15,000 business people to understand the interests and expectations of the metaverse. more

How to Avoid Insider Threats Such as the Latest New York Post Hacking

Evan Morris New York Post has been "hacked" by an employee. To protect themselves from insider threats, companies can deploy zero trust and restrict access. On October 27, the New York Post published a string of racist and sexist articles on its website. Fabricated news about politicians, such as pieces concerning racist comments of a New York City mayor, has been headlining the publication. more

AI Already Succeeding in Most Creative Tasks and Getting Better by the Day

Mark Datysgeld It is redundant to point out how much progress AI applications made during the past few years. What is escaping the attention of many people, however, is that in most creative areas, there are already fully working consumer-grade tools based on generative AI that can produce output similar to that of a human with above-average capabilities, and there are many more on the way. These tools also happen to be rather affordable, making them accessible to a large amount of people. more

Looking at Centrality in the DNS

Geoff Huston The Internet's Domain Name System undertakes a vitally important role in today's Internet. Originally conceived as a human-friendly way of specifying the location of the other end of an Internet transaction, it became the name of a service point during the transition to a client/server architecture. A domain name was still associated with an IP address, but that 1:1 association was weakened when we started adjusting to IPv4 address exhaustion. more

In Memoriam: Frederick P. Brooks, Jr. – a Personal Recollection

Steven Bellovin Brooks is famous for many things. Many people know him best as the author of The Mythical Man-Month, his musings on software engineering and why it's so very hard. Some of his prescriptions seem quaint today -- no one these days would print out documentation on microfiche every night to distribute to developers -- but his observations about the problems of development remain spot-on. But he did so much more. more

Three Reasons Why CISOs Need to Understand Domain Security

Sue Watts Domain name abuse is one of the most dangerous and under-regulated issues in digital business security today. An attack on a web domain can lead to the redirection of a company's website, domain spoofing, phishing attacks, network breaches, and business email compromise (BEC). Domains used as a company's online world are part of an organization's external attack surface and need to be continuously monitored for cybercrime attacks and fraud. more

The Price for Faster Upload Speeds

Doug Dawson I've always been impressed by the marketing folks at the big cable companies. They are masters of extracting money from customers willing to pay for better broadband. The latest example comes from Comcast. The company is introducing a new product in the Northeast that offers faster upload speeds -- for a price. Comcast knows that its biggest weakness is upload speeds. more

Achieving Multi-Stakeholder Progress on DNS Abuse

Ajith Francis DNS Abuse and how to address it has been the topic of intense, often conflictual, and rarely conclusive discussions for many years, starting with the very definition of the term and the degree of responsibility bestowed upon DNS operators. In 2018, after several months of intersessional work, the Internet & Jurisdiction Global Conference brought together in Ottawa more than 200 key stakeholders to define a roadmap to address certain jurisdictional challenges on the Internet, including DNS abuse. more

The Fibre Optic Path

Geoff Huston In August 1858, Queen Victoria sent the first transatlantic telegram to U.S. President James Buchanan. The cable system had taken a total of four years to build and used seven copper wires, wrapped in a sheath of gutta-percha, then covered with a tarred hemp wrap and then sheathed in an 18-strand wrap, each strand made of 7 iron wires. It weighed 550kg per km, with a total weight of over 1.3Mkg. more

ICANN Policymaking Should Be Even More Transparent

Jon Nevett Transparency and accountability are embedded in ICANN's core values. Indeed, ICANN's Bylaws mandate that "ICANN and its constituent bodies shall operate to the maximum extent feasible in an open and transparent manner ...". Public Interest Registry believes that a dedication to transparency is fundamental to the strength and continued effectiveness of ICANN's multistakeholder model. more

News Briefs

Annual Datacenter Forum in Copenhagen Changes Conference Programme Following Nord Stream Explosions

In light of Tuesday's Nord Stream 1 and 2 pipeline explosions, Datacenter Forum is updating its programme. Ask Tonsgaard Hjordt Brüel (Strategic Consultant, Rambøll), who has been tasked by the Nordic Council of Ministers to analyse the supply, security, and pricing of Nordic energy sources will share his preliminary findings at Datacenter Forum Copenhagen this week. more

CENTR Publishes the CENTRstats Global TLD Report Edition 2 2022

The latest CENTRstats Global TLD Report has been released, covering the global status and registration trends in all top-level domains (legacy gTLDs, new gTLDs and ccTLDs), with a specific focus on the European ccTLD market. According to the report, the rate of domain name sales, deletions and registrar transfers seem to be gradually returning to pre-pandemic levels. more

DNS Abuse Institute Launches Centralized DNS Abuse Reporting Service

The DNS Abuse Institute (DNSAI), the entity created by Public Interest Registry (PIR), today announced the launch of NetBeacon, a centralized DNS Abuse reporting service. NetBeacon was developed in collaboration with CleanDNS, an anti-abuse solution developer, which has donated the development and technology behind NetBeacon. more

European ccTLDs Saw a Slow Down in Domain Name Sales, Deletions and Transfers, According to CENTR’s Latest Report

The latest CENTRstats Global TLD Report has been released, covering the global status and registration trends in all top-level domains (legacy gTLDs, new gTLDs and ccTLDs), with a specific focus on the European ccTLD market. According to the report, domain name sales, deletions and registrar transfers slowed down for European ccTLDs over 2021; however, demand for new domains is still outpacing deletes, keeping growth in the positive. more

CENTR Publishes Comment on the European Commission’s DNS Abuse Study

CENTR, which represents European national top-level domain name registries (ccTLDs) such as .si or .eu, has published its comments on the European Commission's DNS abuse study, calling out some of the "misleading analysis and unfortunate conclusions in the study." more

Ukraine’s Internet Access and Quality in Rapid Decline Since Russian Invasion

New research paints a rapidly deteriorating picture of the Internet in Ukraine since Russia's invasion. Published by BroadbandNow, the research analyzes internet access and quality in Ukraine over the past six weeks beginning February 1st. more

Ukrainian Representatives to ICANN Ask for Russia’s Domain to Be Revoked, Local DNS Root Servers Shut Down

A letter sent to ICANN and IANA by a Ukrainian representative to ICANN’s Government Advisory Council (GAC) asks for urgent and strict sanctions against the Russian Federation in “the field of DNS regulation.” The letter urges ICANN to permanently or temporarily revoke Russia’s top-level domains “.ru”, “.рф” and “.su” and to shut down DNS root servers located in Saint Petersburg and Moscow. more

The Internet Infrastructure in Afghanistan (Event)

Join the upcoming discussion today on the past, present and future of the Internet in Afghanistan in the context of the Middle East. Panelists will address the national and international challenges and opportunities Afghans face in the changing environment of global Internet governance and sanctions laws. more

CENTR Publishes the CENTRstats Global TLD Report for Q2 2021

CENTR has published the latest edition of its CENTRstats Global TLD report, a quarterly publication that presents statistics and trends in domain name registrations of European country-code domains and the wider global market. more

Google Cloud Lands Grace Hopper Subsea Cable in Bude, Cornwall

Google Cloud has landed its muchly anticipated subsea cable, Grace Hopper in Bude, Cornwall. The 16-fiber pair Google-funded cable will connect New York (United States) to Bude (United Kingdom) and Bilbao (Spain). more

CENTR Publishes the CENTRstats Global TLD Report for Q1 2021

CENTR has just published the latest edition of its CENTRstats Global TLD report, a quarterly publication that presents statistics and trends in domain name registrations of European country-code domains and the wider global market. more

Close to Half of US East Coast Fuel Supply Shutdown Due to Ransomware Cyberattack

Colonial Pipeline, which accounts for close to half of the United States East Coast's fuel, has shut down its operations due to a cyberattack. The incident, believed to be the largest successful cyberattack on oil infrastructure in the U.S., was disclosed over the weekend. more

18 Million of the 22 Million Net Neutrality Comments Received by FCC in 2017 Were Fake

A multi-year investigation into 2017 net neutrality rulemaking finds 18 million fake comments were filed with the US Federal Communications Commission (FCC) and half a million fake letters were sent to Congress. more

SpaceX’s Starlink Satellite Internet Service Has Received 500K Preorders, Says the Company

SpaceX on Tuesday disclosed that it has received 500,000 preorders for its Starlink satellite internet service and that it anticipates no technical problems meeting the demand. more

InternetNZ Has Disclosed a Vulnerability That Can Be Weaponized Against Authoritative DNS Servers

New Zealand's .nz operator, InternetNZ, on Wednesday disclosed a vulnerability against authoritative DNS servers. The vulnerability called TsuNAME was first detected in February 2020 in the .nz registry and found that it could be exploited to carry out Denial-of-Service (DoS) attacks across the world. more

Government of India Gives the Go-Ahead for 5G Technology and Spectrum Trials, Avoids Chinese Firms

The Department of Telecommunications (DoT), Government of India, approved permissions today to Telecom Service Providers (TSPs) for conducting trials for use and applications of 5G technology. more

Beavers Chewing Through Fiber Cable Cause Hundreds Lose Internet in a Canadian Remote Community

Internet service was down for nearly 900 customers in Tumbler Ridge, British Columbia, over the weekend after beavers chewed through a crucial fiber cable, resulting in "extensive" damage. According to a statement from the area's telecom provider, Telus, the outage also affected some cable TV customers and caused disruptions to local cell phone services. more

Pentagon Gave Control of 175M Dormant IP Addresses to Florida Company Right Before Trump’s Departure

The US Department of Defense gave a small unknown Florida company control to millions of its dormant IP addresses, minutes before President Trump left office. According to reports, the unknown Florida company, Global Resource Systems LLC, initially obtained control of 56 million Pentagon-owned IP addresses on January 20 and later increased to near 175 million IP addresses. more

Security Researcher Dan Kaminsky Has Died

The celebrated security researcher, Dan Kaminsky, widely known for his work on discovering cruicisl DNS security flaws, Sony Rootkit infections and pupular talk at the Black Hat Briefings. more

ISPs Saw a 30% Increase in Traffic During the Pandemic, 40% During Peak Business Hours

ISPs in the U.S. saw a significant surge in both downstream and upstream traffic, increasing at least 30% and as much as 40% during peak business hours and as much as 60% in some markets, according to a new report from the Broadband Internet Technical Advisory Group (BITAG).  more

Most Read – Last 30 Days

Recent Comments

The Continuing WHOIS Disappearing Act

Topics

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Industry Updates

Robin Banks May Be Robbing You Blind

WhoisXML API You may be wondering who Robin Banks is, but you should instead ask what Robin Banks is. Robin Banks is a phishing-as-a-service (PhaaS) platform that first surfaced in March this year. The name is a play on the phrase "robbing banks," coined by IronNet researchers who introduced the malicious platform to the world. more

Investment-Related Cybersquatting: Another Way to Lose Money?

WhoisXML API This year, the stock market is at its most volatile state due to several factors. Debates abound about whether 2022 will be as bad as 2008, but we'll leave that up to the experts. more

Beware That Software Update, It Could Be Magniber in Disguise

WhoisXML API Did you know that a Magniber ransomware infection can cost you a ransom of as much as US$2,500? The operators' favored method of delivery? Fake Windows 10 updates, putting 80% of all Windows operating system (OS) users worldwide at risk. The campaign, believed to have begun in April this year, remains a threat. Are Windows 10 users the only ones at risk, though? more

The Business of Cybercrime: Does Malicious Campaign Planning Take as Long as Legitimate Marketing Campaign Planning?

WhoisXML API It has become customary for cybercriminals to ride on famous brands to make their nefarious campaigns work. The release of the world's most-awaited tech gadgets is no different. And given the public attention and techies' innate desire to be first to own the latest gadgets, threat actors will always zoom in on prospective buyers via the most ingenious scams. more

2022 CSC Domain Security Report Finds Nearly Three-Quarters of Global 2000 Companies are at Alarmingly High Risk of Exposure to Security Threats

CSC We have just released our third annual Domain Security Report that found three out of four Forbes Global 2000 companies have not adopted key domain security measures - exposing them to high risk of security threats. These companies have implemented less than half of all domain security measures. more

Black Friday and Cyber Monday Bring on the Scariest Sales

Threat Intelligence Platform (TIP) Black Friday and Cyber Monday are two of the most-awaited shopping events each year. That said, they have also become favored scammer targets for the most ingenious campaigns designed to part shoppers with their cash or, worse, identities. more

RIPE 85 News Update

IPv4.Global Over 1,000 organizations are each waiting more than 300 days to get a block of just 256 IPv4 addresses -- a /24 -- in the RIPE region. The RIPE NCC warned that the wait time will soon reach 24 months despite allocating 900 /24s in the last year. more

Dormant Colors IoC Expansion: Don’t Install Browser Extensions from These Domains

WhoisXML API Internet users are being tricked into installing browser extensions that can hijack their web searches. The end goal could be to insert affiliate links, but who knows what other malicious activities the threat actors behind them are capable of? more

Rogue Tor Browser: When Search for Anonymity Leads to Exposure Instead

WhoisXML API Anyone who wishes to browse the Internet without the prospect of being spied upon by others, whether for legal or illegal purposes, can always rely on using the Tor browser if they're so inclined.  more

Domain Shadowing IoC Expansion Led to Thousands of Possible Connections

WhoisXML API Palo Alto Networks threat analysts discovered more than 12,000 cases of domain shadowing after scanning the Web from April to June 2022. For this threat, all cybercriminals need to do is create malicious subdomains under legitimate domains... more

A Call for Help May Lead to Malware: BazarCall IoC Analysis and Expansion

Threat Intelligence Platform (TIP) More sophisticated BazarCall campaigns have been circulating and delivering ransomware entry points to victims. While the bait still involves urgent notification emails about nonexistent purchases or subscriptions, the subsequent phase highlights the threat actors' manipulative skills. more

Eternity’s LilithBot, Soon Available to Regular Internet Users?

WhoisXML API Eternity, also known as the "EternityTeam" or "Eternity Project," has been active since January 2022 and tied to the Jester Group. It gained infamy for using the as-a-service subscription model to distribute its own brand of malware modules via underground forums. more

A Closer Look at Active Cyber Jihad Web Properties

WhoisXML API Cyber jihad loosely refers to Islamic extremist terrorists' use of the Internet as a communications, fundraising, recruitment, training, and planning tool in their war against their enemies. Some of their most commonly cited enemies include the U.S., Western European countries, secular Arab governments, and Israel. more

Alleviating BlackEnergy-Enabled DDoS Attacks

WhoisXML API BlackEnergy first appeared in 2007. Designed to launch distributed denial-of-service (DDoS) attacks or download customized spam or banking data-stealer plug-ins, it was again used to target the State Bar of Georgia last May more