Industry

Latest

Dark Caracal: Undisclosed Targeted Attack IoCs Can Pose Risks

Targeted attacks are known as some of the most destructive cyber attacks in that they zoom in on organizations that either provide critical services or have massive user bases. more

Mobile, Social, and Recommerce: The Top eCommerce Trends from 2020

This year has seen rapid growth for eCommerce, with people turning to online shopping more than ever due to lockdowns and quarantine restrictions. Recent studies have shown that the COVID-19 pandemic has accelerated the shift away from physical stores to digital shopping by roughly five years. more

How Much of a Fortune 500 Company’s Digital Footprint Can Be Publicly Attributed to It?

Not all of the domains that contain a company's brand are under its control. A portion of them - sometimes even the vast majority -- is typically registered by unidentifiable third parties with masked WHOIS records. Arguably, WHOIS redaction might also be preferred by the companies themselves for privacy purposes. But to which extent is this the case? more

A Look Into Tor Nodes’ Locations and ISPs with IP Intelligence

The Tor Project has been synonymous with the Deep Web, as it is a primary method by which users can access hidden portions of the Internet. Besides traffic encryption, an additional feature that gives Tor users anonymity is that their network traffic passes through several nodes, making the real source unidentifiable. more

Verisign Q3 2020 Domain Name Industry Brief: Internet Grows to 370.7M Domain Name Registrations

Today, we released the latest issue of the Domain Name Industry Brief, which shows that the third quarter of 2020 closed with 370.7 million domain name registrations across all top-level domains (TLDs), an increase of 0.6 million domain name registrations, or 0.2 percent, compared to the second quarter of 2020. Domain name registrations have grown by 10.8 million, or 3.0 percent, year over year. more

What Subdomains Lookup Revealed About Thousands of Microsoft-Related Subdomains

Microsoft is among the most imitated brands globally. Running the company's popular product and service names, such as LinkedIn, Office365, and Windows, on a subdomains lookup tool, we uncovered 7,900 related subdomains. more

Business Email Compromise Attacks: The Big Phishing Scam That’s Easily Missed

Business email compromise (BEC) attacks are arguably the most sophisticated of all email phishing attacks, and some of the most costly. From 2016-2018, BEC alone made $5.3 billion, but it's not an attack that everyone is familiar with. more

Donuts Inc. to Acquire Afilias, Inc.

Donuts Inc., the global leader in next generation top-level domains (TLD) and digital identity, today announces that it has entered into an agreement to purchase Afilias, Inc. for an undisclosed sum. more

Thousands of Government-Related Subdomains Revealed in Subdomains Search

Elections and other events related to the government typically drive a great amount of Internet activity. Considering the domain name space, we found 4,197 subdomains related to the U.S. elections and the government in general. more

10 Common Digital Threats to Businesses

The year 2020 has created an increased impetus for change - especially as companies embrace digital transformation at an accelerated pace. Cybercriminals have also upped their game, switching their attention to hot targets such as healthcare and pharmaceutical brands. more

3-Phase Approach to .BRAND Strategy – Socialization, Experimentation, Implementation

A year after KPMG migrated all their webpages under home.kpmg, the Brand Registry Group interviewed them to talk about the impact. In the interview, KPMG shares how planning and communication are key in changing to a .BRAND domain name. Their experience ties in nicely to CSC’s three-phase .BRAND approach. more

Attack Surface Analysis: Most Blacklisted IP Addresses Scrutinized

The attack surface of every Internet user gets wider every day, but it doesn't mean there's nothing that can be done about it. For one, analyzing possible attack vectors, such as suspicious or malicious domain names and IP addresses, can help with attack surface management. more