Industry

Latest

Detecting Possible Domain Generation Algorithm-Related Threats Using Typosquatting Data Feed

Domain generation algorithm (DGA) is used to generate several domain names commonly used for command-and-control (C&C) servers in malware attacks. The logic behind a domain name generation algorithm is quite simple. Instead of hard-coding the domain or IP address into the malware, the malware finds its C&C under a domain with a seemingly random name. more

Subdomain Lookup as Part of Cybersecurity Best Practices

Threat actors are always on the lookout for potential ways into target networks. And although the cybersecurity world has a lot on its radar already, subdomains are entry points that are not always easy to identify and may end up overlooked. more

Using WHOIS History and Other Intelligence Sources for Establishing Potential Attack Surfaces

Cyber attacks can come from practically any angle, and more often than not, it's hard to see them coming without knowing all there is to know about a domain's WHOIS history and connected domain entities. Several aspects come into play in this scenario, one of which is old and forgotten pages on a website. more

Radix Announces the Launch of Namify

The name-spinner is aimed at solopreneurs, small business owners and startups looking for affordable brand-building solutions that include brand name, domain name, social media handles as well as a brand logo. more

Radix's H1 2020 Premium Domains Report

Radix shares its bi-annual premium report for the first half of 2020. This report gives a full overview of the premium domain sales across our nTLD portfolio from 1st January 2020 till 30th June 2020. more

Verisign Q2 2020 Domain Name Industry Brief: Internet Grows to 370.1 Million Domains in Q2 of 2020

Verisign today released the latest issue of the Domain Name Industry Brief, which shows that the second quarter of 2020 closed with 370.1 million domain name registrations across all top-level domains (TLDs), an increase of 3.3 million domain name registrations, or 0.9 percent, compared to the first quarter of 2020. more

Everything You Need to Know About IPv4 vs. IPv6

The "IP" in IPv4 and IPv6 stands for Internet Protocol, which is a set of rules that determine how devices transmit data packets across the Internet. Internet Protocol also assigns a unique address to each device on the web. These addresses ensure data packets are routed to the correct device. more

The Benefits and Risks of Leasing IPv4 Space

With address prices rising, the reasons you may want to become a lessor are clear: extended predictable revenue. Leasing creates an opportunity to monetize IP addresses and sell an IP block for a higher price in the future versus in the current market -- it allows the lessor to keep the IPv4 block in case of future need. more

IP Blacklist and Blacklist Removal

Everyone hates spam. Even worse is malware - something that infects your computer and sends spam out to you and others or tries to hack into systems. In response to these problems, many people began to maintain lists recording who generates spam and malware. more

Afilias Joins Global Encryption Coalition to Promote Internet Security

Afilias, the world's second largest domain name registry, today announced that it has joined the Global Encryption Coalition (globalencryption.org). The Global Encryption Coalition promotes and defends the use of strong encryption for everyone. By joining the coalition, Afilias has joined forces with over 50 civil society organizations, industry associations, and companies to defend encryption that helps protect everyone on the internet. more

i2Coalition and DNA Merger Creates North America's Largest Internet Infrastructure Advocacy Group

The combined association, which will operate under the name i2Coalition and maintain the i2Coalition's existing organizational and management structure, will be the largest Internet infrastructure advocacy group in North America. more

Use of IP Geolocation in Threat Intelligence and Cybersecurity

There is no denying that we need all the help we can get as cyberattacks evolve. IP geolocation data is among the most useful threat intelligence sources that can strengthen an organization's cybersecurity posture. more

Topics

DNS Security

Sponsored byAfilias

Whois

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byAfilias

IP Addressing

Sponsored byIPv4.Global

Cybercrime

Sponsored byThreat Intelligence Platform

Brand Protection

Sponsored byAppdetex

Most Viewed – Last 30 Days