Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Verisign iDefense 2015 Cyber-Threats and Trends

Here is an overview of the key cyber security trends we expect to see in 2015. The majority of this year's threats and trends reflect research on iDefense's core focus areas of cyber-crime, cyber espionage and hacktivism. more

3 Questions to Ask Your DNS Host About DDoS

Neustar provides UltraDNS and recently dealt with an attack on our network that was massive by industry standards, impacting our customers and even our upstream providers. more

Exploring BlackTech IoCs Reveals Hundreds of Artifacts in 2022

BlackTech, an APT group known for cyber espionage activities targeting Asia, was recently detected using a new malware called “FlagPro.” NTT Security named some indicators of compromise (IoC) related to the new campaign, including five IP addresses and two subdomains. more

Attack Surface Analysis: Most Blacklisted IP Addresses Scrutinized

The attack surface of every Internet user gets wider every day, but it doesn't mean there's nothing that can be done about it. For one, analyzing possible attack vectors, such as suspicious or malicious domain names and IP addresses, can help with attack surface management. more

Port25 Announces Release of PowerMTA V4.5r5

Port25, A Message Systems Company, has just released its latest version of PowerMTA v4.5r5 and PowerMTA Management Console v1.5r5. Highlighted here are the major features of this particular release more

Through the Spyglass: NSO Group Spyware Pegasus in Focus

The NSO Group has been known for targeting dissident journalists and bloggers notably with its proprietary spyware Pegasus. In November 2021, for instance, Apple sued the NSO Group for its alleged surveillance and targeting of its device users. more

eHarmony Chooses NeuStar’s Ultra Services Network Infrastructure

eHarmony, the Internet's #1 trusted relationship service, has selected NeuStar's Ultra Domain Name Systems (DNS) service to deliver enhanced web site performance. more

Illegally Streaming “Spider-Man: No Way Home” Could Be Hazardous to Your Computer

Given the dangers that COVID-19 poses to people's health and the emergence of new variants every so often, it's easy to see why avid moviegoers would resort to streaming instead. But while they may indeed be avoiding the disease, their attempts to download pirated movies is not only illegal -- it could put their computers at risk. more

Eternity’s LilithBot, Soon Available to Regular Internet Users?

Eternity, also known as the "EternityTeam" or "Eternity Project," has been active since January 2022 and tied to the Jester Group. It gained infamy for using the as-a-service subscription model to distribute its own brand of malware modules via underground forums. more

Motivated to Solve Problems at Verisign

As the world keeps changing, so do the requirements for products and services and the ways to achieve them most effectively. Our researchers and engineers continue to innovate and adapt to those changes, while also anticipating the next ones. more

NeuStar to Enhance Global Internet Security by Hosting Core DNS Root Nameserver

NeuStar announced today that it has entered into an agreement with Internet Systems Consortium, Inc. (ISC) to host its F-root nameserver (one of the Internet's 13 global DNS root nameservers) on NeuStar's DNS Shield infrastructure. more

Afrinic’s IP Address Crisis Raises Red Flags for Entire African Internet’s Sustainability

The recent IP address crisis involving Africa’s regional internet registry (Afrinic) and Cloud Innovation has shaken up the internet industry, also raising the long-standing question if RIR’s IP asset governance policies are sustainable for long-term network growth. more

Demand Media and Directi join forces for .PW

Demand Media's eNom, the world's largest ICANN Accredited wholesale registrar, today confirmed its participation as an accredited registrar for .PW - the Professional Web. more

Are Mypressonline.com’s Free Subdomain Creation Services Being Abused?

It’s not uncommon to see free web hosting providers get abused as part of phishing campaigns. IBM X-Force Exchange, in fact, published three indicators of compromise (IoCs) related to such an incident. more

Reverse WHOIS: A Powerful Process in Cybersecurity

The future continues to look bleak as the total amount lost to cybercrime is expected to keep growing. It will, in addition, put incentives for innovation and investment at risk, making cybercrime more profitable than ever. more

Topics

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Latest