New kids on the cybercrime block, pig butchering scams, have been making waves lately, and it is not surprising why. Scammers have been earning tons from them by being able to trick users into investing in seemingly legitimate business ventures but losing their hard-earned cash instead. more
As the .brands program evolves, it's truly rewarding to see the space maturing -- as companies' use of their branded domains become more diverse and find clear connections with business strategy and corporate priorities. more
Today, we released the latest issue of the Domain Name Industry Brief, which showed that the first quarter of 2018 closed with approximately 333.8 million domain name registrations across all top-level domains (TLDs), an increase of approximately 1.4 million domain name registrations, or 0.4 percent, compared to the fourth quarter of 2017. more
What's in a name? With nearly 200 million registered domain names worldwide, an increasing number of organizations, companies and individuals are fine-tuning their online marketing campaigns and selecting domain names that will enhance brand value. more
Radix, one of the world's largest portfolio registries, today announced that it has made one-time premium name sales of more than $137K since August 2018. These one-time sales were made through domain marketplace SEDO and via top registrar partners. Names that fetched maximum value were across .online, .space and .fun TLDs. more
The global deployment of Domain Name System Security Extensions (DNSSEC) is charging ahead. ...today, ICANN hosted the first production key ceremony at a secure facility in Culpepper, Va. where the first cryptographic digital key was used to secure the Internet root zone. more
Complying with strict data privacy regulations like the General Data Protection Regulation (GDPR) is a must do. Violators can get penalized as much as €10 million or 2% of their annual turnover. This reality makes it critical for organizations, therefore, to employ strict employee, customer, and stakeholder data management policies. more
We've seen threat actors abuse almost all Windows OS applications in their campaigns, disguising malware as macros, Word documents, Excel spreadsheets, and PowerPoint presentations to trick users into opening and executing them. Most recently, they've been spreading malware in the guise of OneNote documents to cause mayhem. more
Sydney’s most highly prized online real estate assets have today been released to the market as Australia’s most iconic city inherits a truly iconic web address with the launch of .sydney domain names for pre-release applications. more
Last week I attended the Internet Governance Forum in Nairobi, Kenya. It was an amazing event in a fantastic city - Nairobi - a booming tech center and a regional hub in Africa for all things NGO. more
ReliaQuest named LockBit one of the most effective and undoubtedly most prolific currently active ransomware groups today. In fact, the malware topped their latest ransomware quarterly list for the first three months of 2023, a continuation of their 2022 observation. more
One of the main reasons for this is the fact that Traditional Partner Registrars are aligned towards Mass Market Products and can only provide limited success for these extensions. more
BlueCat Networks, the IPAM Intelligence™ company, today announced that its IP Address Management, DNS and DHCP solutions are now officially in evaluation for Common Criteria Evaluation Assurance Level 2+ (EAL-2+) Certification after successfully completing several initial milestones. more
.ORG, The Public Interest Registry today released the results of its second bi-annual domain name report, "The Dashboard"; by the close of the year, the total number of domains under management was almost 8 million - an increase of 8.4 percent since 2008. more
Back in 2015, a survey found that cats drove 15% of the overall Internet traffic. That said, it is not surprising for threat actors to use cat-related content to lure victims to visit their malware-laden sites. Such was the case for GootLoader, which allowed cybercriminals to steal data and deploy post-exploitation tools and ransomware. more
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byDNIB.com