Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Framework for Resilient Cybersecurity (Webinar)

A shift in security architecture is needed, to an open platform where devices and services from different vendors can share, and act, on threat intelligence information, all in concert and in the proper context. Join Ramakant Pandrangi, Vice President of Technology, and learn how to assist with designing a resilient security ecosystem by maximizing an API-centric approach. more

What Is the Current State of Malicious PPI Businesses and Affiliate Networks?

Pay-per-install (PPI) businesses and affiliate networks made for a booming cybercriminal underground market from 2008 to 2013. Buoyed by the proliferation of fake antivirus (FakeAV) peddlers, operators made staggering profits from the sale of rogue security software.
 more

Subdomain Lookup as Part of Cybersecurity Best Practices

Threat actors are always on the lookout for potential ways into target networks. And although the cybersecurity world has a lot on its radar already, subdomains are entry points that are not always easy to identify and may end up overlooked. more

WhoisXML API Launches White-Label Brand Monitor to Make Brand Protection More Accessible

WhoisXML API recently launched a while-label variant of its Brand Monitor solution so more organizations can offer domain brand protection and marketing services using their own label. more

New .VOTE and .VOTO Domains Now Available

Monolith Registry, a venture backed by global registry services provider Afilias, announced today that registration is now open to the public for two new generic top-level domains: "dot VOTE" or .VOTE, and its Spanish/Italian/Portuguese counterpart "dot VOTO" or .VOTO. more

Afilias Managed DNS Services Adds SiteCertain to Keep Watch on Your Web Site

Today Afilias, a leading provider of Internet infrastructure services, announced the availability of SiteCertain, a new add-on feature to its Managed DNS Services. SiteCertain enables Afilias Managed DNS customers to add web server monitoring, content monitoring and IP address fail-over to their Managed DNS account, to ensure the reliability and uptime of their Web sites. more

Domain Registrar Selection: A Key Indicator of Overall Organization Security

This week, CSC and SecurityScorecard - the global leader in cyber security ratings for enterprise organizations - released an important piece of research in a whitepaper that shows a company's choice of domain registrar really does matter when it comes to cyber security. more

Radix Closes Holiday Sales With Over 35K Paid Registrations

Radix has been actively working behind the scenes to create a splash across the domain name market with aggressive Black Friday and Cyber Monday deals. more

Online Shopping Danger? 13K+ Cybersquatting Properties of Top E-Commerce Sites Discovered

AliExpress is among the most visited business-to-customer (B2C) e-commerce sites globally, with millions of visitors daily. Therefore, a recent cybersquatting campaign targeting the platform could lure many victims into buying counterfeit products, divulging their login credentials, downloading malware, and many other actions that could jeopardize their data and devices. more

Detectify vs Intruder: External Attack Surface Management on a Budget

Choosing an attack surface management or a vulnerability management platform often comes down to identifying which tool provides the right mix of visibility, automation, and precision that matches your team's needs, ideally at as low a price as possible. more

Tracing Connections to Rogue Software Spread through Google Search Ads

Taking control of victims' accounts is typically the end goal of many cybercriminals, and they never cease to come up with wily ways to do so. Bleeping Computer researchers recently spotted hackers spreading malware mayhem through Google search ads supposedly pointing to open-source software download sites. more

Best Attack Surface Monitoring Tools

A whopping 600 million cyberattacks every single day - that's what organizations face nowadays, according to the Microsoft Digital Defense Report. The sheer volume of threats, coupled with the expanding attack surfaces resulting from digital transformation, scaling, and other factors, has made attack surface monitoring a must even for organizations that were previously happy with a more traditional vulnerability management approach. more

What Holds Firms Back from Choosing Cloud-Based External DNS?

Cloud is all the rage. Across industries, companies of all sizes have embraced business applications and platforms that are based on the cloud. After all, doing so offers numerous benefits in terms of deployment, upkeep, reliability, and cost as compared to running the same services on premise. more

Looking Into the Latest Microsoft Exchange Server Vulnerability Exploitation

A threat actor reportedly infiltrated the network of and stole data from a financial institution about a month ago by exploiting any of four Microsoft Exchange Server vulnerabilities -- CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, or CVE-2021-27065. While patches for all these have been released, users who have not downloaded and installed these could remain at risk. more

Reverse Domain Name Hijacking: What It Is and How to Avoid It through a Domain Availability Check

Deciding on a domain name is both an exciting and challenging task that every website owner must undertake. A good domain name must sound interesting and be easy to remember while echoing the nature of the business. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Latest