Virtual Private Networks help ensure data flows between endpoints are private and secure. This means VPN users can enhance their online anonymity, bypass geographic restrictions, secure data transfers, and more. And yet, there are still legitimate concerns that a small number of VPNs - either accidentally or intentionally - expose users to greater risk than if they hadn't used a VPN at all. more
Threat actors can often find targeting certain organizations too much of a challenge. So they need to go through what we can consider back channels -- suppliers, vendors, or service providers. more
Hilco Streambank's IPv4.GLOBAL, the world's most experienced internet protocol address broker, today announced a program dedicated to helping educational institutions fund their future projects. The program focuses on valuing and monetizing IPv4 addresses. more
The market for IPv4 addresses continues to show resilience, with January 2025 figures indicating a modest uptick in pricing across several block sizes. Data from IPv4.Global by Hilco Streambank reveals that while average prices hovered in the low-to-mid $30s per address, the actual range of transactions was significantly broader, spanning from $28 to $48 per address. This highlights the persistent pricing variability driven by block size, buyer urgency, and negotiation dynamics. more
For 16 months, PayMyTab, a third-party payment provider, leaked the private data of customers who dined in a U.S. restaurant when it failed to follow a simple yet essential security protocol. more
Toward the end of August 2024, a customized malware dubbed "Voldemort" based on strings found in its code was used in a cyber espionage campaign targeting various countries. more
Today the i2Coalition is announcing that Neha Naik, Vice President of Channel Partnerships at Radix; Jesse Asklund, Chief Experience Officer of cPanel / WebPros; Ursula Baum, Associate General Counsel at Newfold Digital; and Suzanne Law Marisa, US General Counsel for OVHcloud, have joined the Board of Directors of the organization. more
Throughout the history of the Internet, traditional DNS traffic - for example, when a user types a website name into a browser - has largely been unencrypted. The DNS over HTTPS (DoH) protocol, which first emerged in 2018, makes use of the well-known secure HTTPS web protocol to change that. more
Cybercriminals behind the JSCEAL campaign exploited malicious ads to spread fake crypto trading apps, generating millions of views and DNS activity across Europe in 2025. Check Point Research uncovered 94 domains as IoCs, exposing extensive DNS abuse, typosquatting, and infrastructure links fueling this large-scale, deception-driven cyber threat. more
CSC is currently the only provider in the market offering our unique tool giving complete oversight of your most business-critical assets - namely CSC Security Center. It gives you the ability to monitor proactively the security status of all of your vital domains, DNS, digital certificates - as well as receive email alerts of changes or potential risks as and when they happen. more
As NFTs continue to grow in popularity, questions about how to protect both intellectual property and consumers will increase. In 2021, NFT sales reached an estimated $24.9 billion. That's up from $94.9 million the year before. more
In a recent CSC webinar, we welcomed information security expert Robin Schouten of ABN AMRO Bank N.V. to share his thoughts and experiences of online fraud during the onset of the coronavirus pandemic. more
Responding to the market's demand to understand the commercials of the IP leasing market better, IPXO has launched its Statistics Hub, unveiling the latest details and trends as they appear on the IPXO Marketplace. more
This year has seen rapid growth for eCommerce, with people turning to online shopping more than ever due to lockdowns and quarantine restrictions. Recent studies have shown that the COVID-19 pandemic has accelerated the shift away from physical stores to digital shopping by roughly five years. more
A seven-year malware campaign, orchestrated through seemingly trusted browser extensions, exposed millions of users to DNS abuse. ShadyPanda's infrastructure reveals how trust, subtlety and DNS manipulation sustained an enduring threat. more
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global