Threat Intelligence

Sponsored
by

Noteworthy

WHOIS History API: Powering Domain Investigations

Domain Research and Monitoring: Keeping an Eye on the Web for You

Reverse WHOIS: A Powerful Process in Cybersecurity

Threat Intelligence / Featured Blogs

Preventing Future Attacks: Alternatives In DNS Security Management - Part I

The October 21 DDoS attacks against the 13 root-name servers containing the master domain list for the Internet's Domain Name System (DNS), (which reportedly took offline 9 of the 13 servers) remain a clear and daunting reminder of the vulnerabilities associated with online security. Many DNS authorities have named the most recent hit the largest DDoS attack against the root server system. Chris Morrow, network security engineer for UUNET, the service provider for two of the world's 13 root servers, recently told The Washington Post... more

Have You Monitored Your DNS Performance Lately?

Domain Name System (DNS) surveys such as that recently conducted by Men & Mice continually demonstrate that the DNS is riddled with errors. Since the DNS continues to work, this raises three questions:

1. Does it matter that the DNS is riddled with errors?
2. Why is it riddled with errors?
3. How can it be fixed? more

Industry Updates

Beyond Healthcare IoCs: Threat Expansion and EHR Impersonation Detection

Detecting ChatGPT Phishing on Social Media with the Help of DNS Intelligence

Detecting Malware Disguised as OneNote with Threat Intelligence

Detecting Carder-Friendly Forums through IoC Expansion

SocGholish IoCs and Artifacts: Tricking Users to Download Malware

Profiling a Massive Portfolio of Domains Involved in Ransomware Campaigns

The Fight Against Hive Ransomware May Not Be Done as Yet-Unidentified Artifacts Show

Gauging How Big a Threat Gigabud RAT Is Through an IoC List Expansion Analysis

Catching Batloader Disguised as Legit Tools through Threat Vector Identification

Tracing Connections to Rogue Software Spread through Google Search Ads

Malware Persistence versus Early Detection: AutoIT and Dridex IoC Expansion Analysis

Sifting for Digital Breadcrumbs Related to the Latest Zoom Attack

Cloud Atlas May Hide Their Tracks but 1,800+ Unpublicized Artifacts Can Help Orgs Tag Them

Exposing Chat Apps Exploited for Supply Chain Attacks

From Data Breach to Phishing to Lapsus$: Cyber Attacks That Echoed in 2022