Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Procuring Digital Evidence for Reverse Domain Hijacking Case with Domain Research & Monitoring Tools

Reverse domain name hijacking is a shady practice that some individuals and organizations carry out. It occurs when a trademark owner makes false claims in an attempt to gain control of a domain that someone else owns. more

Common Threats That Can Be Overcome by Email Verification

One of the most effective and prevalent ways to reach someone in today's business world remains email. With billions of users worldwide, it is the backbone of business communications. more

Matanbuchus with Cobalt Strike: Not Your Favorite Combo

For US$2,500, threat actors can employ Matanbuchus, a malware-as-a-service (MaaS) package found delivering Cobalt Strike beacons through phishing and spam messages. Cobalt Strike is a powerful security tool that threat actors are increasingly using as a reconnaissance and post-exploitation weapon. more

Operation Dream Job: Same Tactics, New Vulnerability and Domains?

Operation Dream Job, a malicious group first seen in 2020, involves threat actors spoofing job hunting sites to lure people. It resurfaced in February 2022, this time exploiting a zero-day vulnerability in Google Chrome more than a month before the flaw was detected and a patch was made available. more

Both Aged and New Domains Play a Role in the NDSW/NDSX Malware Campaign

Cyber attackers typically use newly registered domains (NRDs) in their campaigns to evade detection, particularly since the implementation of privacy protection in WHOIS records. But some also use aged domains like the SolarWinds hackers to render a sense of legitimacy to their pages. more

Are Banks and Their Customers Once Again at Risk of Typosquatting Woes?

A typosquatting campaign targeting U.S. Bancorp was uncovered a few weeks ago, potentially posing a threat to the financial institution and its customers. As of this writing, four domains and their IP resolutions were identified as indicators of compromise (IoCs). more

Verisign Announces .コム Domain Names Are Now Available for Anyone to Register

Verisign is excited to announce the General Registration Period for .コム -- the .com you know, now in Japanese -- during which anyone can register .コム domain names on a first-come, first-served basis, subject to availability and the applicable registry policies. The General Registration Period for コム began at 00:00:00 UTC on June 13, 2016, following the Landrush Program Period.* more

HermeticWiper: Another Threat Targeting Ukraine at Large

HermeticWiper, also known as "IsaacWiper" or "Sandworm," which wipes the data on computers, rendering them useless, has reportedly affected hundreds of Ukrainian users since it surfaced. While a few cybersecurity specialists have publicized indicators of compromise (IoCs) related to the ongoing campaigns, we found more connected web properties that users may need to steer clear of to avoid becoming the next victims. more

Joining Forces to Advance Protection Against Growing Diversity of DDoS Attacks

At Verisign, we focus on protecting companies from increasingly complex cyber threats, and this relationship should only raise the bar higher, as it will provide a different, more integrated approach than what's used today, to help ensure faster and more efficient detection and mitigation. more

Maximizing the Mobile Web User Experience: Tips of the Trade

The CTIA reported in its Semi-Annual Wireless Industry Survey at the end of 2012 that there are 326 million mobile devices in the United States, 12 million more than there are people. But what's intriguing is that what started out as communication devices are increasingly being used as transaction devices. more

3 Ways a DNS Lookup Tool Can Help Prevent DNS Attacks

The Domain Name System (DNS) is a crucial element of the Internet and a foundation of networking. Every organization going online uses the DNS. more

From Counterfeiting to Phishing: Cybersquatting Properties Target Network Device Makers

Early last July 2022, news broke out about the arrest of a CEO who allegedly sold fake Cisco networking devices. While he used e-commerce sites as sales channels, the idea that counterfeit products are also peddled through cybersquatting domains is not too far-fetched. more

Recent Trends and Options to Mitigate DDoS Attacks (Webcast)

This Monday, December 3, Neustar will hold a webcast to review recent trends in attacks and the most popular methods of mitigation. During the 60 minute webcast, recent attacks will be analyzed as well as implications they have had on DDoS mitigation solutions. more

Over 7 Million Domain Names Registered in Q2 2012, Total Domains Pass 240 Million Worldwide

The increase of 7.3 million domain names globally equates to a growth rate of 3.1 percent over the first quarter of 2012, and marks the sixth straight quarter with greater than two percent growth. more

NeuStar Celebrates 10 Years of UltraDNS Managed DNS Service

In 1999, Rodney Joffe -- now senior vice president and senior technologist at NeuStar implemented the first large-scale commercial applications of IP Anycast for DNS while at UltraDNS, the Reston, Virginia-based managed domain name services company he founded. A decade later, in the wake of NeuStar's April 2006 acquisition of UltraDNS, this initiative has enabled NeuStar to build one of the world's leading managed DNS services, renowned for performance, reliability and security. more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Latest