DNS Security |
Sponsored by |
|
A new DNS-based domain validation method promises to streamline certificate automation by reducing DNS write requirements, improving operational security, and aligning with broader industry moves toward scalable, standards-based certificate management.
As online attacks grow in complexity and scale, DigiCert's RADAR Brief reveals why resilience across DNS, DDoS, and automation is emerging as the defining metric of digital trust in a hyperconnected economy.
A DNS investigation into GhostCall and GhostHire uncovers how BlueNoroff targeted tech leaders and Web3 developers, exposing extensive data theft and a wide malicious infrastructure that included suspicious domains, weaponized IP addresses, and typosquatted assets.
Russia-linked threat actor COLDRIVER has revamped its malware into a new backdoor called MAYBEROBOT, targeting NGOs and dissidents. Early DNS signals and IP resolutions reveal a methodically evolving cyber-espionage campaign.
A threat campaign known as Beamglea exploited npm packages to target over 135 companies globally. Researchers uncovered 175 malicious packages, 344 related domains, and dozens of IP-linked artifacts through DNS and WHOIS analysis.
A coordinated crackdown on RaccoonO365 reveals the scale of phishing-as-a-service operations, as domain and DNS data expose hundreds of linked artifacts and offer a window into the infrastructure of low-skill cybercrime.
Cybercriminals are swapping standard image formats for SVG files to smuggle malware into systems. A detailed investigation uncovered a sprawling network of suspicious domains, IP addresses, and email-linked infrastructure used for espionage and cryptojacking.
WhoisXML API's Q3 2025 analysis found global new domain registrations dipped 1.2% from Q2, with gTLDs rising and ccTLDs falling sharply. The .cc ccTLD remained an anomaly, and .com led malicious domain activity.
A Chinese-language SEO poisoning campaign has been uncovered, leading users to fake software sites. Investigators linked the scheme to malware variants and uncovered thousands of malicious domains, subdomains, and IP addresses through DNS and WHOIS analysis.
DNS Security Extensions (DNSSEC) offer cryptographic safeguards to validate DNS responses, countering spoofing and cache poisoning. While implementation is complex, best practices and third-party services help firms navigate the operational demands of deployment.