Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Deep Dive Into the GreedyBear Attack

Koi Security recently dove into the widely executed and highly coordinated GreedyBear crypto theft attack that used 150 weaponized Firefox extensions. According to the company, it utilized close to 500 malicious executables and dozens of phishing sites. The result? The threat actors have amassed more than US$1 million to date. more

False Positive Rate Reduced to 1.66% on WhoisXML API’s First Watch Malicious Domains Data Feed

WhoisXML API has halved the false positive rate of its malicious domain feed, enhancing detection precision. The update refines machine learning models, promising leaner cybersecurity operations and fewer interruptions from erroneous threat alerts. more

The Rise of AI Agent Surface Management (ASM-AI)

As AI agents gain delegated authority in enterprise systems, they introduce a new security frontier: ASM-AI. The real threat is no longer malicious code, but trusted bots making unsupervised, high-risk decisions. more

Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive

Cybercriminals are swapping standard image formats for SVG files to smuggle malware into systems. A detailed investigation uncovered a sprawling network of suspicious domains, IP addresses, and email-linked infrastructure used for espionage and cryptojacking. more

IPv4 Market Trends: A Year of Declining Prices in a Resilient Market

Despite falling IPv4 address prices throughout 2025, transaction volume and buyer activity remained strong. Expanding demand, growing liquidity, and healthy fundamentals suggest a stable, functioning market heading into 2026. more

QakBot Named a 2026 Top Malware Threat: An IoC Analysis

An IoC deep dive into QakBot, newly ranked among 2026's top malware threats, reveals sprawling infrastructure, recycled domains, and fresh artifacts, underscoring how phishing-led access campaigns continue to endanger email-reliant enterprises worldwide. more

Resilient Demand and Price Stability Mark IPv4 Market in August

The IPv4 market continues to demonstrate healthy activity as August figures point to sustained transaction volume and steady pricing across most block sizes. Buyers and sellers alike remain engaged, with pricing dynamics showing signs of alignment across the spectrum. more

2025 IPv4 Market Report: A Year of Price Correction and Growing Participation

In 2025, IPv4 address prices declined to decade lows, but market activity remained strong. Rising buyer participation and steady transaction volume signaled a resilient, well-functioning market entering 2026 with confidence. more

IPv4 Market Shows Early Signs of Stabilization Amid Persistent Demand

After months of declining prices, the IPv4 market shows early signs of stabilisation, with firming prices, resilient global demand, and sustained transaction volume suggesting a gradual rebalancing rather than a structural downturn. more

Divulging the DNS Secrets of DarkSpectre

Koi Security exposes the DNS infrastructure behind DarkSpectre's latest cyber campaign. Their investigation uncovers nearly 9,000 suspect domains and IP links, revealing how a stealthy browser extension compromised 2.2 million users. more

AI and IP Infringement: Why Detection Is Becoming a Race Against Time

As generative AI accelerates deepfakes, counterfeit domains, and brand impersonation, legal teams are struggling to keep pace. Detection speed has become critical, forcing companies into an AI-driven arms race to protect intellectual property and corporate trust. more

Shining the DNS Spotlight on Lumma Stealer

The U.S. Department of Justice seized 114 domains connected to a major information-stealing campaign utilizing Lumma Stealer on 21 May 2025. The Cybersecurity and Infrastructure Security Agency (CISA) released the list of indicators of compromise (IoCs) on the same date. more

Top 10 Malware of Q4 2025: A DNS Deep Dive

An analysis of 46 DNS indicators tied to seven of Q4 2025's most prevalent malware families reveals early warning signals, coordinated campaigns and hundreds of connected artifacts, underscoring the predictive power of proactive threat intelligence. more

DNS Analysis of the Keenadu Backdoor Network

Keenadu backdoor embedded in Android firmware exploits supply chains and OTA updates, while DNS analysis of its infrastructure reveals coordinated domains, IP links, and early warning signals pointing to premeditated, scalable cybercriminal operations globally distributed. more

Analyzing Account Takeover Attacks Leveraging SquarePhish2 and Graphish

State-sponsored and criminal groups exploited OAuth weaknesses using SquarePhish2 and Graphish to hijack Microsoft 365 accounts, prompting data theft and broader infiltration campaigns. Analysts uncovered 46 confirmed indicators and hundreds of related artifacts. more

Topics

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Latest