Domain generation algorithm (DGA) is used to generate several domain names commonly used for command-and-control (C&C) servers in malware attacks. The logic behind a domain name generation algorithm is quite simple. Instead of hard-coding the domain or IP address into the malware, the malware finds its C&C under a domain with a seemingly random name. more
As Neustar celebrates its 10-year corporate anniversary, it seems a good time to take stock of where we are within the dynamic Internet industry. Change and growth have been constants in the domain business, and we've even had to survive a pretty challenging recession. more
Cybercriminals know no boundaries. While the world battles the COVID-19 pandemic, threat actors continue to attack businesses that may already be suffering from operational setbacks. more
NeuStar, Inc. today announced that NASDAQ Dubai, the international stock exchange between Western Europe and East Asia, has selected NeuStar's UltraDNS Managed Services to enhance the security and performance of NASDAQ Dubai's platform. more
Afilias, a global provider of Internet infrastructure services, today announced that it has enabled Domain Name System Security Extensions (DNSSEC) for five country code Top-Level-Domains (ccTLDs) in Latin America and the Caribbean region. more
The .PW Registry today announced that more than 50,000 .PW domain names were registered in just 3 weeks since the beginning of its General Availability phase. .PW, launched as "the Professional Web", was available for General registrations from March 25, 2013 with a strong distribution channel of 120+ ICANN Registrars. more
Since its launch last November, the ChatGPT hype has only increased not only among users but also abusers. Cyble researchers recently spotted phishing attacks using supposed ChatGPT sites to phish for personally identifiable information (PII), specifically credit card data. more
ZeuS malware traces its origin as far back as 2006, when it was used to steal victims' online banking credentials. In 2011, its source code was leaked on a file-sharing site and quickly spread throughout various underground fora. more
When visitors fail to recognize that the site they visit is a fraudulent copy of that of a famous brand, they can expose themselves to cybercrime and other attacks. As part of these attacks, typosquatting is a common technique that hackers use to lure victims. They create websites that very closely resemble that of the brand they are trying to hijack so the victims would not have a clue that it is fake. more
nugg.ad, a German company based in Berlin that provides an application service provider (ASP) solution for predictive behavioral targeting, has chosen NeuStar's UltraDNS Managed Services to bolster the scalability and reliability of nugg.ad's DNS infrastructure. more
Neustar today announced that it is expanding its cloud-based mitigation platform and delivering new services to provide customers greater protection from malicious, constantly evolving DDoS (distributed denial-of-service) attacks. more
The Federal Bureau of Investigation (FBI) shut down BreachForums, a forum for English-speaking black hat hackers, on 21 March 2023, following the arrest of its owner Conor Brian Fitzpatrick. more
Details about an ongoing cybersquatting campaign targeting Turkish Airlines were recently unveiled, naming 13 malicious domains connected to the threat. As one of our primary goals is to expand published lists of indicators of compromise (IoCs), we dug deeper into the campaign to determine if the threat is confined to Turkish Airlines or if other industry players are at risk as well. more
The World Intellectual Property Organization (WIPO) recorded a 12% increase in Uniform Domain-Name Dispute Resolution Policy (UDRP) cases filed in 2018. In fact, WIPO saw a total of 3,447 cases that covered 5,655 domain names. What this implies... more
Technology, for its immense evolution, has now become a significant driver of the economy – both digital and global. Along with developments and innovations such as cloud-based computing and Internet-connected mobile devices, however, cybercrime lurks in the shadows. more
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byDNIB.com