Cybercriminals behind the JSCEAL campaign exploited malicious ads to spread fake crypto trading apps, generating millions of views and DNS activity across Europe in 2025. Check Point Research uncovered 94 domains as IoCs, exposing extensive DNS abuse, typosquatting, and infrastructure links fueling this large-scale, deception-driven cyber threat. more
Attaxion announces the addition of the Agentless Traffic Monitoring capability to its exposure management platform. Agentless Traffic Monitoring is a new capability designed to give cybersecurity teams actionable visibility into network traffic flowing to and from their digital assets -- all without the need to deploy any agents or sensors on these assets. more
The IPv4 market continues to demonstrate healthy activity as August figures point to sustained transaction volume and steady pricing across most block sizes. Buyers and sellers alike remain engaged, with pricing dynamics showing signs of alignment across the spectrum. more
In "Soco404: Multiplatform Cryptomining Campaign Uses Fake Error Pages to Hide Payload," Wiz analyzed a campaign exploiting cloud environment vulnerabilities and misconfigurations to deploy cryptominers. Soco404 payloads were embedded in fake 404 HTML pages hosted on websites built using Google Sites. Google has taken down the sites since their reporting. more
Radix has recorded its strongest performance yet in the premium domain space, with registrations growing by 50% year-on-year in the first half of 2025. This marks a dramatic upswing in demand for high-value digital assets, particularly within the technology sector. more
WhoisXML API announces the launch of its MCP server that allows large language models (LLMs) to query 17 of its APIs, enabling users to access unique internet infrastructure intelligence data, run bulk queries and conduct complex internet infrastructure research projects directly from the chatbot interface using natural language. more
Cyber threats are escalating in scale and sophistication, driven by AI and growing regulatory pressure. CSC's CISO Outlook 2025 reveals how domain-based attacks are testing security teams - and why stronger governance, strategic investment, and trusted partnerships are critical for resilience. Download the full report to navigate what lies ahead. more
A whopping 600 million cyberattacks every single day - that's what organizations face nowadays, according to the Microsoft Digital Defense Report. The sheer volume of threats, coupled with the expanding attack surfaces resulting from digital transformation, scaling, and other factors, has made attack surface monitoring a must even for organizations that were previously happy with a more traditional vulnerability management approach. more
In the recently published "Top 10 Malware Q2 2025," the Center for Internet Security (CIS) Cyber Threat Intelligence (CTI) Team named the top 10 malware for the quarter, along with their corresponding indicators of compromise (IoCs). more
Proofpoint released "10 Things I Hate about Attribution: RomCom vs. TransferLoader" detailing connections between RomCom and TransferLoader. While the researchers said the backdoors were typically used by different groups -- RomCom by TA829 and TransferLoader by UNK_GreenSec, they did see similarities between the threat actors' campaigns. more
The market for IPv4 addresses, already constrained by finite supply is undergoing a period of subtle yet significant transition. Data from IPv4.Global's July 2025 report reveals a continuing decline in average prices per address - particularly among larger blocks - even as transaction volume sees a notable surge. more
Check Point Research published an in-depth analysis of the recent spearphishing attack launched by Iranian threat group Educated Manticore. The attackers targeted Israeli journalists, high-profile cybersecurity experts, and computer science professors from leading Israeli universities. more
Sponsored byVerisign
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byCSC