Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Post NordVPN Data Exposure: Using Domain Threat Intelligence to Prevent MitM Attacks

NordVPN admitted last month that its data center located in Finland was hacked on March 5, 2018. While the virtual private network (VPN) service provider claimed it learned of the incident as early as April 13, 2019, it only confirmed the compromise last month after reports that its expired Transport Layer Security (TLS) certificate and its private key were leaked. more

BlueCat Networks Expands in China

BlueCat Networks, the IPAM Intelligence company, today announced it is investing multi-million USD in Asia Pacific (APAC) as part of its continued aggressive expansion in the region. more

DNS Record Contents: Are Organizations Giving Away More Than They Should?

There are several directions an organization can take when naming critical digital properties. A classic tactic is using a common theme, such as pet names, planets, or colors. A CTO suggested naming database nodes after “Game of Thrones (GoT)” characters. Taking this route makes for an obscure naming system that would be difficult for third parties to guess. more

Profiling a Popular DDoS Booter Service’s Ecosystem

Cybercriminals can launch distributed denial-of-service (DDoS) attacks with relative ease these days by using DDoS booter services, online services that automate the DDoS attack process. more

The Inner Workings of the Russian Business Network

The Russian Business Network (RBN) claimed to be a legitimate Internet service provider (ISP) back in 2006. Shortly after establishing its business, however, it gained notoriety for hosting the sites owned by spammers, malware operators, distributed denial-of-service (DDoS) attackers, and other cybercriminals. more

Protecting Your Business from DDoS Attacks: Advice from Neustar

Whether it's due to angry customers, social protests, competitors, or other entities, more and more businesses are being affected by DDoS attacks. In just the last year, 3 out of 4 businesses have experienced an attack. more

Afilias Partners With Internet Society to Sponsor Deploy360 ION Conference Series Through 2016

IONs are part of the Internet Society's Deploy360 Programme, which aims to foster the global adoption of key Internet technology standards such as IPv6, DNSSEC, and secure routing protocols. more

RedLine Stealer: IoC Analysis and Expansion

For roughly US$100, threat actors can purchase RedLine Stealer, a malware-as-a-service (MaaS) program first detected in March 2020 that continues to wreak havoc to this day. The malware can steal information from infected devices, including autocomplete and saved information on browsers. more

The Irony: Data Privacy Sites Bring Risks Instead of Protection

Many countries celebrate Data Privacy Awareness Week every last week of January. Each year, the National Cyber Security Alliance (NCSA) makes it a point to remind users about the importance of keeping their digital data safe from all kinds of threat actors. In fact, they commemorated this year's Data Privacy Awareness Week with various events. more

AusRegistry Int. and Crowell & Moring Join Forces to Support New Top-Level Domain Applicants

AusRegistry International, a leading provider of Domain Name Registry Services, today announced the establishment of a strategic relationship with Crowell & Moring, a leading international law firm recognised for its expertise in a number of areas including the domain name industry, to offer a range of consulting and technical registry services to new Top-Level Domain (TLD) applicants. more

Spam Arrest Chooses UltraDNS to Enhance Service Delivery

NeuStar has announced that Spam Arrest, a Seattle-based company that efficiently monitors and stops automated junk email, has chosen NeuStar's UltraDNS Managed DNS and Traffic Management Services to support the delivery of services to Spam Arrest's global customer base. more

Why UDRP Panelists Must Follow the Policy: A Look at the Devex.org Decision

Observers of the UDRP are aware that ICANN has substantially abrogated responsibility for oversight of the UDRP. ICANN accredits dispute resolution providers (DRPs) without requiring a contract so that the DRPs are held to no enforceable standards. more

Cybercrime Innovation: Tackling Emerging Threats and Vulnerabilities

What keeps CISOs up at night? For hundreds of senior company leaders across countries and industries, the steady growth of cybercrime is one of their biggest concerns. Consequently, organizations spend more money than ever to mitigate the risks and consequences of data breaches, despite a new wave of attacks being on its way as we speak. more

Using WHOIS Domain Lookup Tools to Identify Malicious Domains and Prove Misuse

Presumptive conclusion or inference suggests that a piece of evidence is authentic based on other facts recognized by the law. When law enforcement and cybersecurity researchers investigate cases, they come across strong evidence that may be insufficient on their own to implicate a victim or move a case forward. more

Behind the Bylines of Fake News and Disinformation Pages

Fake news and disinformation have been significant issues for some time now, even urging the U.S. government to push back against proliferators who, some opine, do the malicious deed for political or financial gain. Amid this scenario, many have begun doubting what's real and what's not on the Web not just in the U.S. but worldwide. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Latest