Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

MOVEit Bug-CLOP Ransomware Threat Vector Identification Aided by DNS Intelligence

The beginning of the month of June, according to CleanINTERNET, marked the emergence of several zero-day attacks targeting vulnerable MOVEit servers to exfiltrate confidential data. MOVEit Transfer is a managed file transfer software that supports file and data exchange. more

Radix & WHMCS Offer Free .HOST Domains to All WHMCS Customers

Leading Web Hosting Billing and Automation provider WHMCS, announced today that its partnership with the .HOST domain registry (Radix) has received an impressive response within the first week of launch. more

Profiling the Massive Infrastructure Behind the Democratic National Committee Cyberintrusion

The Democratic National Committee (DNC) breach was a high-profile cyber attack in recent history. Years later, the cybersecurity community can still benefit from insights and actionable intelligence relevant to the attack. In line with this, WhoisXML API threat researcher Dancho Danchev dove deep into the DNS system intrusion using publicly available indicators of compromise (IoCs). We further enriched his findings, allowing us to uncover: more

Global Domain Name Registrations Reach 329.3 Million, 2.3 Million Growth in Last Quarter of 2016

Verisign today released the latest issue of the Domain Name Industry Brief, which shows that the global domain name registrations grew by 2.3 million in the fourth quarter of 2016, and closed with a base of 329.3 million domain names across all top-level domains (TLDs) -- a 6.8 percent increase, year over year. more

How IP Netblocks Data Can Enrich SIEM Software

There's no denying the fact that many enterprises worldwide use security information and event management (SIEM) software. These products collect, analyze, and create reports on cybersecurity data from the range of systems an organization uses. Some SIEM programs are even capable of stopping attacks in progress as soon as these are detected. more

What’s the Domain Attack Surface of the Top 10 Most Impersonated Brands in Q2 2021?

Domain attack surface discovery is an incessant quest for domain and subdomain names that could be used as attack vectors. The larger its attack surface, the more vulnerable an organization tends to be. On the other hand, the more attack vectors discovered, the higher the chances of mitigating cyber attacks. more

DNS Insights behind the JumpCloud Supply Chain Attack

Even solutions meant to enhance security can sometimes fall prey to the best cyber attackers. That's what happened to JumpCloud, a cloud-based directory service platform designed to centralize and simplify identity access management (IAM). more

1 Month Until Applications Open for the DotAnything Internet Revolution

With only one month until applications open for ICANN's new Top-Level Domain program, ARI Registry Services (ARI) is today urging potential applicants to act now before the opening of the 90 day application window on 12 January 2012. more

The Web.com Data Breach: A Quick Investigation with Domain Reputation Lookup

On 16 October, Web.com – the world's oldest domain name provider and owner of Network Solutions, NameSecure, and Register.com – disclosed a major breach resulting in the leakage of its customers' personally identifiable information (PII). more

NeuStar’s UltraDNS to Power Growth of NDTV Convergence

NeuStar, Inc. has announced that NDTV Convergence, the digital arm of New Delhi Television (NDTV), India's largest news and infotainment network, has chosen NeuStar's UltraDNS Managed DNS Service to bolster the scalability of its online properties. more

How Do You Choose the Best Threat Intelligence Platform for Your Company?

Experts often say every cyber threat intelligence team needs a threat intelligence platform, but what is it really and how do you choose the best one for your company? Andreas Sfakianakis, in his recent SANS Institute CTI Summit 2021 talk titled "Excelling at Threat Intelligence Platform Requirements," inspired us to take a deeper look. more

Vertical Integration: A View from the Bottom Up

An interesting thing happened on the way to ICANN's new Affirmation of Commitments. ICANN staff has consistently recommended a reversal of its longstanding policy that prohibits a registry from acting as a registrar in its own top level domain ("TLD"). We see two good reasons why this anti-consumer proposal is unacceptable. more

Behind the Genesis Market Infrastructure: An In-Depth DNS Analysis

As long as cybercriminals remain in business, so will the number of underground marketplaces grow. And despite the crackdown on the biggest markets like Silk Road, cybercriminals will continue to strive to put up their own marketplaces, probably given their profitability. Case in point? more

DIY Web Attacks Might Still Live on via WebAttacker

Age is rarely an issue when it comes to malware campaigns, and that's certainly true for WebAttacker. WebAttacker is a do-it-yourself (DIY) malware creation kit that became popular back in 2006. It was the first exploit kit made available to cybercriminals in the Russian underground market for as little as US$20. more

Radix Adds Dyn as a DNS Service Provider

Radix has contracted global industry leader Dyn to become its second supplier of DNS services for all its new domains. Dyn's DNS service will run concurrently with Radix's existing DNS services, thereby adding a layer of DNS redundancy. more

Topics

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Latest