As AI agents gain delegated authority in enterprise systems, they introduce a new security frontier: ASM-AI. The real threat is no longer malicious code, but trusted bots making unsupervised, high-risk decisions. more
As ICANN prepares to reopen its New gTLD application window in April 2026, brand owners must decide whether a dotBrand domain offers strategic control, security and long-term digital identity advantages beyond traditional domain portfolio models. more
A stealthy phishing campaign known as PHALT#BLYX leveraged fake CAPTCHAs and BSOD screens to deploy DCRat, with forensic analysis uncovering widespread DNS misuse, typosquatting, and more than 21,000 email-connected domains. more
Despite falling IPv4 address prices throughout 2025, transaction volume and buyer activity remained strong. Expanding demand, growing liquidity, and healthy fundamentals suggest a stable, functioning market heading into 2026. more
Koi Security exposes the DNS infrastructure behind DarkSpectre's latest cyber campaign. Their investigation uncovers nearly 9,000 suspect domains and IP links, revealing how a stealthy browser extension compromised 2.2 million users. more
CSC's 2026 Domain Security Report reveals persistent vulnerabilities across the Global 2000, with domain-based threats rising and unicorn firms showing mixed security maturity amid growing regulatory pressure and AI-driven cyber risks. more
State-sponsored and criminal groups exploited OAuth weaknesses using SquarePhish2 and Graphish to hijack Microsoft 365 accounts, prompting data theft and broader infiltration campaigns. Analysts uncovered 46 confirmed indicators and hundreds of related artifacts. more
Silver Fox, a Chinese state-backed hacking group, disguised its espionage campaign as Russian activity using Cyrillic-laced lures and DNS infrastructure, deploying ValleyRAT to steal intelligence and finance operations through Microsoft Teams abuse. more
A sophisticated campaign by Ashen Lepus targeted Arabic-speaking government entities using a newly identified malware suite, AshTag. Enhanced encryption, obfuscation techniques, and extensive infrastructure analysis signal a notable evolution in the group's tactics. more
A seven-year malware campaign, orchestrated through seemingly trusted browser extensions, exposed millions of users to DNS abuse. ShadyPanda's infrastructure reveals how trust, subtlety and DNS manipulation sustained an enduring threat. more
An analysis of domains linked to the top malware strains of Q3 2025 reveals early threat signals, typosquatting patterns, and thousands of connections to malicious infrastructure, underscoring the predictive power of DNS telemetry. more
Acronis researchers uncovered a vast malvertising scheme named TamperedChef, which exploited legitimate-looking apps to deploy malicious scripts, steal data, sell remote access, and lay the groundwork for espionage and ransomware campaigns. more
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byCSC