Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

We Don’t Want to Spoil Mother’s Day but These Domains Might

We're supposed to spoil our mothers on Mothers' Day, but with various scams out there, you may end up losing money or with a malware-infected device. WhoisXML API researchers found more than a thousand digital properties that could be used in Mothers' Day scams. more

Reverse Domain Name Hijacking: What It Is and How to Avoid It through a Domain Availability Check

Deciding on a domain name is both an exciting and challenging task that every website owner must undertake. A good domain name must sound interesting and be easy to remember while echoing the nature of the business. more

Looking Into the Latest Microsoft Exchange Server Vulnerability Exploitation

A threat actor reportedly infiltrated the network of and stole data from a financial institution about a month ago by exploiting any of four Microsoft Exchange Server vulnerabilities -- CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, or CVE-2021-27065. While patches for all these have been released, users who have not downloaded and installed these could remain at risk. more

Should We Consider the Maze Ransomware Extinct?

The Maze Ransomware Group is one of the most notorious threat actor groups targeting large enterprises, such as Cognizant, Xerox, and Canon, and stealing massive amounts of sensitive data. Some of their ransomware distribution methods include spamming, phishing, and brute forcing. more

A Look at Recent Attacks on K-12 Distance Learning Providers Using Domain Intelligence

As early as December of last year, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) received reports of several cyber attacks targeting K-12 distance learning institutions. more

Emotet Botnet Reconnaissance: What’s the Latest?

Emotet traces its origin as far back as 2014, when its simplest form as a banking Trojan first made the headlines. Over the years, its creators have constantly improved the malware, a popular malware-as-a-service (MaaS) offering in cybercriminal underground fora. more

Radix Launches Three New TLDs in Sunrise With Backing from 50+ Registrar Partners

Radix launched three of its uncontested extensions into Sunrise: .website, .press and .host. Radix enters its first Sunrise partnered with 50+ prominent domain registrars, establishing a strong foundation for success in the international domain market. more

DDoS Attacks: Top 10 Trends and Truths (Video)

DDoS experts recently participated in a webinar conducted by Neustar for a revealing discussion on how DDoS attacks are evolving and what to look for in 2012. Watch the following on-demand webcast. more

Join Paul Vixie & Robert Edmonds at the Upcoming Distinguished Speaker Series

Verisign Labs Distinguished Speaker Series is a quarterly forum to bring together members of the technical community to network and listen to distinguished speakers about issues related to internet technology. more

Why IT Security and DevOps Teams Are Often at Odds

Achieving an ideal organizational network means seamless development, operations, and security. Knowing and achieving that, however, is a great challenge. more

Can Domain Blacklisting Be Avoided?

If we're to sum up what any domain owner would want to avoid, it would be ending up in anyone's blacklist. Domain blacklisting has detrimental consequences for any business. Actually, it can have the same or similar negative brand effects as you'd see in the aftermath of a data breach or PR incident. more

Neustar Announces nTLD Registry Services

The only thing tougher than getting a TLD is everything after. With the unprecedented launch of hundreds of new Top Level Domains (nTLDs), how will registry operators differentiate? Will their name space be trusted? Is their distribution strategy optimal? How will they continue to navigate the ever-changing ICANN policy landscape? more

The Roots of WHOIS and Its Applications: 3 Fundamental Questions

Journalists, brand specialists, cybersecurity researchers... Everyone wants answers on who does what online, so where can you get the clues you seek? WHOIS data, alongside its databases and related products, can help you find out who's behind the most notorious websites - and possibly the shadiest ones as well. more

A DNS Deep Dive Into Malware Crypting

Each time organizations shore up their network defenses, cybercriminals devise new and innovative ways to up the cyber attack ante. That's actually the rationale behind malware crypting - the process of making malicious programs, apps, and files appear harmless to anti-malware and intrusion detection solutions. more

.PW Landrush Goes Live

The Registry for .PW – the Professional Web, today announced the opening of the Landrush Period, a limited time opportunity to acquire short, valuable and industry defining keyword domain names. The Landrush phase is active for just 29 days from 18th February, 2013 to 18th March, 2013. more

Topics

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Latest