Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

What Cyber Threat Intelligence Tools Can Reveal about a Targeted Attack

Targeted attacks are considered insidious digital threats as they may lead to debilitating data breaches with substantial financial repercussions. Apart from money lost to theft, victims may shed even more resources as they face expensive lawsuits, hefty fines, and settlements for failing to comply with data privacy regulations in addition to reputational damage. more

Tracing BlackNet RAT’s History through a DNS Deep Dive

BlackNet RAT, first discovered during the COVID -- 19 pandemic and being distributed via spam messages offering an effective cure for the virus, seems to have outlived the global crisis. more

Tracing the Digital Footprint of Iran’s Mabna Hackers

In 2018, nine Mabna hackers were indicted by a U.S. grand jury for their involvement in different instances of cybercrime. Their victims included about 320 universities and over 50 private, government, and nongovernmental organizations in several countries. more

3 Ways a DNS Lookup Tool Can Help Prevent DNS Attacks

The Domain Name System (DNS) is a crucial element of the Internet and a foundation of networking. Every organization going online uses the DNS. more

NeuStar’s UltraDNS to Power NASDAQ Dubai

NeuStar, Inc. today announced that NASDAQ Dubai, the international stock exchange between Western Europe and East Asia, has selected NeuStar's UltraDNS Managed Services to enhance the security and performance of NASDAQ Dubai's platform. more

Credential-Hinting Domain Names: A Phishing Lure?

As an attack vector, phishing has had several underlying purposes – e.g., delivering malware, stealing sensitive information, and defrauding victims. However, it looks like most phishing emails could be used to obtain user credentials according to the 2021 Annual State of Phishing Report by Cofense. more

WHOIS History API: Powering Domain Investigations

The Internet is like a beach - you will most likely leave behind footprints while you are there. And these impressions can be traced back to whoever left them. The same is true with domain ownership. That website name you plan to launch your next venture on? Its domain may have a history of its own. more

Who Could Be Behind the Latest GitHub-Hosted Malware Infrastructure?

GitHub is a popular code repository used by almost all software developers. Anyone can access it to share their code with practically anyone interested. Unfortunately, not every GitHub user is trustworthy. It has, in fact, been used to host malware at least a couple of times. more

NeuStar Goes to Bat for Louisville Slugger Online

Hillerich and Bradsby, maker of the famous Louisville Slugger™ baseball bat, has selected NueStar's Ultra Services Managed DNS service to protect their e-commerce business and allow for the efficient management of their network. more

Carpet-Bombing Attacks: A Rising Threat to ISPs

News of a South African ISP's two-day outage sent the industry abuzz last month, highlighting the need for improved distributed denial-of-service (DDoS) attack mitigation. more

The Era of Malware: 3 Techniques to Detect and Stay Protected

A while back, creating malicious software was sort of a hobby for programmers. It was hardly ever used to make money, but more of a way to show off what one can do with a computer. more

Optimus Selects NeuStar to Bring Converged Instant Messaging Services to Portugal

NeuStar has announced that Portuguese mobile operator Optimus has selected NeuStar's Next Generation Messaging (NGM) services to power Optimus' multi-community converged instant messaging (IM) service and new IP-based services. more

.PW Crosses 50,000 Domain Registrations in 3 Weeks

The .PW Registry today announced that more than 50,000 .PW domain names were registered in just 3 weeks since the beginning of its General Availability phase. .PW, launched as "the Professional Web", was available for General registrations from March 25, 2013 with a strong distribution channel of 120+ ICANN Registrars. more

Blurring the Lines between APTs and Cybercrime: Cobalt Mirage Uses Ransomware to Target U.S. Organizations

In the past, security experts typically made a distinction between a cybercrime and an advanced persistent threat (APT). While cybercrime focused on obtaining financial gain, APTs trailed their sights on specific organizations, often to steal nation-state secrets. more

Your Business In Europe: Understanding GDPR & Privacy Shield

It is imperative that U.S. businesses with international and European clients understand how the GDPR may affect their businesses and begin to implement strategies to ensure compliance with the regulation. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Latest