Cybercrime

Cybercrime / Industry Updates

Threat Intelligence: The First Line of Defense Against Data-Stealing Ransomware

The threat landscape is ever-changing. As time goes by, threat campaigns use new and more sophisticated technologies than seen before. Still, some reuse tried-and-tested methods while adding a few other functionalities, as in the case of FTCODE ransomware operators. more

MarkMonitor Releases New gTLD Quarterly Report for Q1 2020

MarkMonitor has released its latest issue of the New gTLD Quarterly Report for the fourth quarter of 2019, noting that DNS abuse continues to raise concerns amongst many registries and registrars. more

The Internet Infrastructure Industry Is Protecting Digital Trust and Fighting COVID-19 Related Fraud

As a global public health and economic crisis unfolds due to the COVID-19 pandemic, and the world's population retreats to social distancing and isolation, the Internet is becoming indispensable to billions of people for purposes of work, leisure and obtaining important information. more

3 Ways a DNS Lookup Tool Can Help Prevent DNS Attacks

The Domain Name System (DNS) is a crucial element of the Internet and a foundation of networking. Every organization going online uses the DNS. more

How a Passive DNS Database Can Help Improve Cyber Resilience

As cyber-attacks become more robust and sophisticated every day, the world of cybersecurity saw the need to shift. Hence, cyber resilience became the new norm. Cyber resilience bases itself on the fact that cyber risks are no longer just IT risks but also business risks. more

Beyond the Firewall: DNS Defenses to Manage Online Threats

The domain name system (DNS) forms the underlying infrastructure for how the internet works, serving as a directory to point users to the right web content. When DNS goes down, websites, email, voice-over IP, and remote employee login goes down with it. more

Phishing Attacks Still Haunt Banking Institutions: How Can Domain Reputation Checks Help?

Phishing attacks continue to post an upward trend. Over the years, phishers have improved their methods, using very convincing domains to bait victims into their schemes. more

Using WHOIS Domain Lookup Tools to Identify Malicious Domains and Prove Misuse

Presumptive conclusion or inference suggests that a piece of evidence is authentic based on other facts recognized by the law. When law enforcement and cybersecurity researchers investigate cases, they come across strong evidence that may be insufficient on their own to implicate a victim or move a case forward. more

Fight Against Phishing: Email Address Verification as a Cybersecurity Process

Phishing keeps making much noise in the realm of cybersecurity, and not in a good way. A majority of cyber attacks start with a phishing email, making the tactic responsible, at least partially, for close to 90% of data breaches. more

The Perils of Typosquatting: The Likely Targets and the Price They Pay

Typosquatting is also known as "URL hijacking," and for good reason. Just as hijackers unlawfully seize a vehicle, typosquatters take over a domain name and use it for malicious activities. more