Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Signs of MuddyWater Developments Found in the DNS

Cyber espionage group MuddyWater's or Mercury's first major campaign was seen as early as 2012. But as things always go in the cybersecurity realm, threat groups, especially those that gain infamy, don't necessarily just come and go. more

Beauty and the Beast: Are These Domains Possible Vehicles for Cosmetic Product Counterfeiting?

Months after TikTok launched its marketplace in September 2021, several users have raised concerns about the authenticity of the products they purchased. The complaints mainly pertain to beauty products, such as sunscreens, lip glosses, and makeup brushes. Aside from being ripped off, consumers may be exposed to more danger. more

Introducing goMobi and Afilias’ New goMobi-Powered Mobile Website

With goMobi's simple intuitive tool, a business can have their new mobile site up in minutes! Better yet, goMobi sites work on any Web-enabled phone, saving resource constrained businesses from any development time for multiple phone apps for different operating systems - goMobi just makes it happen! more

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

This video visualization, filmed in Neustar's Security Operations Center, shows the first three minutes of an actual DDoS attack on a company's Transmission Control Protocol Synchronize (TCP SYN) authentication. more

Malware Persistence versus Early Detection: AutoIT and Dridex IoC Expansion Analysis

AutoIT-compiled malware and Dridex trace their roots to as far back as 2008 and 2014, respectively. As malware variants go, therefore, they've both had a long history and taken on various forms over time. But despite having been detected and consequently blocked with each new version, they're still alive and kicking -- a testament to their persistence. more

2016 U.S. Election: An Internet Forecast

The unexpected election of Donald Trump, along with continued Republican control of both houses of Congress will have a big impact on our US priorities. While the outlook remains unclear, we've prepared the memo below examining the initial impact the election may have on issues that matter to Internet infrastructure companies and organizations. more

How Savvy DDoS Attackers Are Using DNSSEC Against Us

Neustar this week published a research report, "DNSSEC: How Savvy DDoS Attackers Are Using Our Defenses Against Us," detailing how Domain Name System Security Extensions (DNSSEC) can be subverted as an amplifier in Distributed-Denial-of-Service (DDoS) attacks. more

NeuStar Launches Its UltraDNS Traffic Controller Service

NeuStar today announced the launch of UltraDNS Traffic Controller, a server load balancing solution within NeuStar's UltraDNS managed services suite; provides enterprises of all sizes with a global server load balancing solution. more

Neustar Opens .BIZ to Rare Two-Character Domain Names

Going forward, Neustar is opening its global .BIZ registry to two-character domain names (e.g., NY.biz, MY.biz, I.biz). Because of the highly coveted, unique status of these domain names, Neustar has issued a Request for Proposals (RFP) inviting potential .BIZ registrants to submit proposals explaining how they would use and promote a particular two-character domain name. more

Malicious Valentine: Uncovering Thousands of Connections to Romance-Themed Campaign IoCs

Romance-themed malicious campaigns are launched throughout the year, but days leading up to Valentine’s Day could be particularly timely for such activities. more

Afilias Supports the CrypTech Project - Ambitious Hardware Encryption Effort to Protect User Privacy

Global domain registry operator and Internet technology innovator Afilias has pledged funding support to the CrypTech Project. CrypTech is an industry effort to address the increasingly challenging Internet security environment, especially as it affects cryptographic algorithms in hardware. more

In the Market for a New Car? Beware Not to Get on the Phishing Bandwagon

In an earlier post, we looked at how cybersquatters took advantage of the popularity of seven car manufacturers to lure unwitting victims to fake sites. Since then, we were alerted to a phishing campaign this time targeting several German car dealers via age-old but still effective phishing. more

What’s in a Name Server?

With the domain name space continuing to expand and new service providers entering the market, there has been a lot of discussion about the different types of DNS services available today. more

IT Project Management: Best Practices in Small-Scale Engagements

In an age of belt-tightening and doing more with less, not every IT project warrants an executive sponsor, someone who assumes the role of full-fledged project manager. more

Have You Seen These Roaming Mantis Connected Artifacts Wandering into Your Phone?

A financially motivated threat group called "Roaming Mantis" was seen targeting Android and iOS device users through malicious SMS communications. The messages sent Android phone users to download pages while iOS users were redirected to credential-stealing login pages. more

Topics

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Latest