Earlier today, GoDaddy announced an agreement to acquire Brandsight. To say that we are thrilled would be an understatement – we couldn't be happier about it. Over the past three years, the Brandsight team has leveraged today's technology along with deep industry experience to build next-generation corporate domain management solutions that are redefining the market. more
As NFTs continue to grow in popularity, questions about how to protect both intellectual property and consumers will increase. In 2021, NFT sales reached an estimated $24.9 billion. That's up from $94.9 million the year before. more
Afilias today announced that it has promoted Ram Mohan to the newly created position of Chief Operating Officer, responsible for most of the day-to-day operations of Afilias and its global subsidiaries. more
Yahoo! News Japan reported cases where securities accounts were hijacked so cybercriminals could sell stocks without their rightful owners' permission. More than 3,500 fraudulent transactions have already been recorded from January to April 2025 alone, amounting to stock owner losses of ¥300+ billion. more
After years of steady ascent, the market for IPv4 addresses is experiencing an uncharacteristic softening. According to new data from IPv4.Global by Hilco Streambank, the average monthly price per address has declined across all block sizes, with the most striking plunge seen in the larger /16 blocks. more
Responding to the market's demand to understand the commercials of the IP leasing market better, IPXO has launched its Statistics Hub, unveiling the latest details and trends as they appear on the IPXO Marketplace. more
Virtual Private Networks help ensure data flows between endpoints are private and secure. This means VPN users can enhance their online anonymity, bypass geographic restrictions, secure data transfers, and more. And yet, there are still legitimate concerns that a small number of VPNs - either accidentally or intentionally - expose users to greater risk than if they hadn't used a VPN at all. more
Remote access trojans (RATs) can be considered the malware of choice by the world's most notorious advanced persistent threat (APT) groups. And there's a good reason for that. They are hard to detect, making them ideal for lateral movement, and also difficult to get rid of. more
Escalating prices for large IPv4 number blocks, coupled with aggressive buyer acquisition strategies in the first half of 2017, stimulated considerable additional supply in the second half of the year, according to the 2017 State of the IPv4 Market Report released by Avenue4 LLC. At the end of 2017, the total number of transactions, aggregate address space transferred, and prices were all steeply up over the prior year even as global activity softened. more
Radix, one of the world's leading new top-level domains registries, today announced that at least 170 startups on .tech have raised over $2B in VC funding between 2017 to 2019. These startups are spread across industries such as Auto, Crypto, Mobility, Energy, etc. more
In recent news, more than 13,000 subdomains of brands were hijacked for a large spam campaign that "leverages the trust associated with these domains to circulate spam and malicious phishing emails by the millions each day, cunningly using their credibility and stolen resources to slip past security measures." more
Throughout the history of the Internet, traditional DNS traffic - for example, when a user types a website name into a browser - has largely been unencrypted. The DNS over HTTPS (DoH) protocol, which first emerged in 2018, makes use of the well-known secure HTTPS web protocol to change that. more
The report reveals that the number of .org domain names registered in 2014 rose 1.3 percent, bringing the total domains under management (DUM) to more than 10,500,000 worldwide. more
The SideWinder advanced persistent threat (APT) group, active since 2012 and known for targeting government, military, and business entities throughout Asia, primarily Pakistan, China, Nepal, and Afghanistan, has struck once again. This time around, the threat actors updated their toolset and created new infrastructure to spread malware and control compromised systems. more
Threat actors can often find targeting certain organizations too much of a challenge. So they need to go through what we can consider back channels -- suppliers, vendors, or service providers. more
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byVerisign