Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

WHOIS History Footprint Tells Us More about the Man Behind the Biggest BLM Scam

In 2018, the biggest scam that banked on the Black Lives Matter movement was exposed. An Australian National Union Workers official named Ian Mackay was allegedly behind the Black Lives Matter Facebook page that garnered more than 700,000 followers and racked over US$100,000 in donations. more

IP Blacklist and Blacklist Removal

Everyone hates spam. Even worse is malware - something that infects your computer and sends spam out to you and others or tries to hack into systems. In response to these problems, many people began to maintain lists recording who generates spam and malware. more

Carding, Still in Full Swing as DNS Intel Shows

Carding has been around since the 1980s but has evolved to the point that even less experienced cybercriminals can now launch campaigns. How? Via the carding forums that riddle the Web these days. more

Verisign Domain Name Industry Brief: 351.5 Million Domain Name Registrations in Q2 2022

Today, we released the latest issue of The Domain Name Industry Brief, which shows that the second quarter of 2022 closed with 351.5 million domain name registrations across all top-level domains, an increase of 1.0 million domain name registrations, or 0.3%, compared to the first quarter of 2022. more

Phisher Abusing .com TLD?

Phishing campaigns almost always require a massive volume of domains in order to succeed. Phishers, after all, need to have readily weaponizable vectors at their disposal in case the ones they're currently employing get detected and consequently blocked. more

Help Ensure the Availability and Security of Your Enterprise DNS with Verisign Recursive DNS

This new cloud-based recursive DNS service leverages Verisign's global, securely managed DNS infrastructure to offer the performance, reliability and security that enterprises demand when securing their internal networks and that communications safely and securely reach their intended destinations. more

Almost Half of Major Consumer Brands Set to Apply for a Dot Brand Top-Level Domain

Leading registry services provider Afilias today announced the results of a USA / UK survey, conducted by Vanson Bourne, on dot Brand top-level domains (TLDs). The survey found that 82 percent of major brands are aware of the opportunity to apply for a dotBrand TLD, and 54 percent of those "aware" companies intend to apply for a dot Brand TLD; that is a total of 44 percent of all companies surveyed who plan to apply. more

Using WHOIS History and Other Intelligence Sources for Establishing Potential Attack Surfaces

Cyber attacks can come from practically any angle, and more often than not, it's hard to see them coming without knowing all there is to know about a domain's WHOIS history and connected domain entities. Several aspects come into play in this scenario, one of which is old and forgotten pages on a website. more

Threat Intel Expansion on Cosmic Lynx BEC Campaign’s Recorded IoCs

Why go after individuals when you can get greater rewards by zooming in on more lucrative targets like large multinational corporations (MNCs)? That's the premise behind the Cosmic Lynx business email compromise (BEC) campaign that brought several MNCs, many of which were Fortune 500 or Global 2000 companies, to their knees. more

A Closer Look at Active Cyber Jihad Web Properties

Cyber jihad loosely refers to Islamic extremist terrorists' use of the Internet as a communications, fundraising, recruitment, training, and planning tool in their war against their enemies. Some of their most commonly cited enemies include the U.S., Western European countries, secular Arab governments, and Israel. more

Do Security Service Providers Need Their Own Data Scientists?

In a world where society is driven by information, data science has gained solid ground over the past years for its ability to separate the wheat from the chaff. Its predictive power is now being explored in the context of cybersecurity. After all, efficient threat protection requires gathering and interpreting the enormous amounts of traffic generated to and from one's network. more

pink.host: Breast Cancer Awareness by Bluehost

October is the month for breast cancer awareness and Bluehost is running a special campaign for it on an alternate URL www.pink.host, pink being the color of solidarity for breast cancer movement. more

Iron Mountain and Afilias Create Program for New gTLD Registry Applicants

Under the terms of this co-referral program, Iron Mountain will refer prospective gTLD Registry Operators to Afilias for Domain Name Registry Services, and Afilias will refer prospective Registry Operators to Iron Mountain for data escrow services. more

Alleviating the Constant Clash Between DevSecOps and DevOps Teams

One of the main struggles of organizations is streamlining processes through cost-effective means. This problem is adequately addressed by DevOps, a set of processes that aims to unify development and operations. more

Dot Brand: Why Your Brand Needs Its Own Top-Level Domain

Are you a brand leader trying to figure out how to establish a sustainable and winning brand presence despite the rapidly changing environment? In the following video, Roland LaPlante, Senior VP and CMO of Afilias explains why a dotBRAND is the answer. more

Topics

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest