Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

DNS Abuse and Redirection: Enough for a New JS Malware to Hide Behind?

DNS abuse combined with redirection seems to be gaining popularity as a stealth mechanism. We've just seen Decoy Dog employ the same tactic. More recently, a still-unnamed JavaScript (JS) malware has been wreaking havoc among WordPress site owners by abusing Google Public DNS to redirect victims to tech support scam sites. more

WHOIS History Footprint Tells Us More about the Man Behind the Biggest BLM Scam

In 2018, the biggest scam that banked on the Black Lives Matter movement was exposed. An Australian National Union Workers official named Ian Mackay was allegedly behind the Black Lives Matter Facebook page that garnered more than 700,000 followers and racked over US$100,000 in donations. more

Iron Mountain and Afilias Create Program for New gTLD Registry Applicants

Under the terms of this co-referral program, Iron Mountain will refer prospective gTLD Registry Operators to Afilias for Domain Name Registry Services, and Afilias will refer prospective Registry Operators to Iron Mountain for data escrow services. more

pink.host: Breast Cancer Awareness by Bluehost

October is the month for breast cancer awareness and Bluehost is running a special campaign for it on an alternate URL www.pink.host, pink being the color of solidarity for breast cancer movement. more

Dot Brand: Why Your Brand Needs Its Own Top-Level Domain

Are you a brand leader trying to figure out how to establish a sustainable and winning brand presence despite the rapidly changing environment? In the following video, Roland LaPlante, Senior VP and CMO of Afilias explains why a dotBRAND is the answer. more

AusRegistry International Appoints Krista Papac as Chief Strategy Officer

AusRegistry International today announced that it has appointed Krista Papac to the role of Chief Strategy Officer, in a move that reinforces the organisation's commitment to becoming an industry-leading provider of Domain Name Registry Services. more

A Closer Look at Active Cyber Jihad Web Properties

Cyber jihad loosely refers to Islamic extremist terrorists' use of the Internet as a communications, fundraising, recruitment, training, and planning tool in their war against their enemies. Some of their most commonly cited enemies include the U.S., Western European countries, secular Arab governments, and Israel. more

Threat Intel Expansion on Cosmic Lynx BEC Campaign’s Recorded IoCs

Why go after individuals when you can get greater rewards by zooming in on more lucrative targets like large multinational corporations (MNCs)? That's the premise behind the Cosmic Lynx business email compromise (BEC) campaign that brought several MNCs, many of which were Fortune 500 or Global 2000 companies, to their knees. more

Verisign Domain Name Industry Brief: 351.5 Million Domain Name Registrations in Q2 2022

Today, we released the latest issue of The Domain Name Industry Brief, which shows that the second quarter of 2022 closed with 351.5 million domain name registrations across all top-level domains, an increase of 1.0 million domain name registrations, or 0.3%, compared to the first quarter of 2022. more

Neustar Selected as Registry Services Provider for 358 Top-Level Domain Applications

Neustar today announced that it has been selected as the registry services provider for 358 applications for new generic Top-Level domains (gTLDs). Additionally, Neustar has been selected by the City of New York as the registry service provider to manage the application process and operate .nyc. more

Carding, Still in Full Swing as DNS Intel Shows

Carding has been around since the 1980s but has evolved to the point that even less experienced cybercriminals can now launch campaigns. How? Via the carding forums that riddle the Web these days. more

Top 10 Malware of Q2 2025: A Deep Dive into the IoCs

In the recently published "Top 10 Malware Q2 2025," the Center for Internet Security (CIS) Cyber Threat Intelligence (CTI) Team named the top 10 malware for the quarter, along with their corresponding indicators of compromise (IoCs). more

Using WHOIS History and Other Intelligence Sources for Establishing Potential Attack Surfaces

Cyber attacks can come from practically any angle, and more often than not, it's hard to see them coming without knowing all there is to know about a domain's WHOIS history and connected domain entities. Several aspects come into play in this scenario, one of which is old and forgotten pages on a website. more

4 Professions Leveraging WHOIS to Stay Ahead

Who are the entities behind the domains on the Web? This question has nothing to do with stalking but is critical for various business activities. Domainers, for instance, want this information to negotiate lucrative purchases while journalists might need it to set up interviews or get leads during investigations. more

Afilias and Crowell & Moring to Collaborate on Supporting New Top-Level Domains

"Afilias offers prospective new TLD applicants complete registry and DNS services that reflect our experience supporting the launches of five new TLDs -- more than any other provider. We are glad to be working with Crowell & Moring, who offers legal and business consultation services that complement our technical expertise," said Roland LaPlante, Senior Vice President and Chief Marketing Officer for Afilias. more

Topics

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Latest