Industry

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Both Aged and New Domains Play a Role in the NDSW/NDSX Malware Campaign

Cyber attackers typically use newly registered domains (NRDs) in their campaigns to evade detection, particularly since the implementation of privacy protection in WHOIS records. But some also use aged domains like the SolarWinds hackers to render a sense of legitimacy to their pages. more

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

As part of our efforts to support National Cyber Security Awareness Month by sharing the latest cybersecurity research, Verisign released its Q3 2015 DDoS Trends Report, which represents a unique view into attack trends unfolding online for the previous quarter. more

Neustar to Build Multiple Tbps DDoS Mitigation Platform

Neustar today announced that it is expanding its cloud-based mitigation platform and delivering new services to provide customers greater protection from malicious, constantly evolving DDoS (distributed denial-of-service) attacks. more

Neustar Launches Web Performance Management Solution, Features Real-Time Intelligent Alerting

With this offering, companies that rely on web performance to drive revenue now have a simple, easy-to-use platform to consistently monitor site performance and quickly mitigate performance-related issues, ultimately protecting their customers' online experience. more

The Domain Business: A Lot Has Happened in 10 Years

As Neustar celebrates its 10-year corporate anniversary, it seems a good time to take stock of where we are within the dynamic Internet industry. Change and growth have been constants in the domain business, and we've even had to survive a pretty challenging recession. more

From Counterfeiting to Phishing: Cybersquatting Properties Target Network Device Makers

Early last July 2022, news broke out about the arrest of a CEO who allegedly sold fake Cisco networking devices. While he used e-commerce sites as sales channels, the idea that counterfeit products are also peddled through cybersquatting domains is not too far-fetched. more

UDRP: Better Late than Never - ICA Applauds WIPO for Removing Misguided ‘Retroactive Bad Faith’

The Internet Commerce Association (ICA), a non-profit trade group representing the domain industry, applauds the World Intellectual Property Organization (WIPO) for removing misleading guidance from the newly released updated version 3.0 of its Overview of WIPO Panel Views on Selected UDRP Questions. more

Afilias Selected As Registry Operator for .Post

Established in 1874, the UPU is headquartered in Berne (Switzerland) and is the second oldest international organization worldwide with 192 member countries. As a United Nations specialized agency, the UPU is the primary forum for cooperation between postal industry players globally. more

Beware That Software Update, It Could Be Magniber in Disguise

Did you know that a Magniber ransomware infection can cost you a ransom of as much as US$2,500? The operators' favored method of delivery? Fake Windows 10 updates, putting 80% of all Windows operating system (OS) users worldwide at risk. The campaign, believed to have begun in April this year, remains a threat. Are Windows 10 users the only ones at risk, though? more

Announcing Verisign IntelGraph: Unprecedented Context for Cybersecurity Intelligence

With significant data breaches making headlines over the last six months, most notably the U.S. Government's Office of Personnel Management (OPM), organizations managing critical networks and data are watching their worst nightmares play out on a public stage. more

1 Month Until Applications Open for the DotAnything Internet Revolution

With only one month until applications open for ICANN's new Top-Level Domain program, ARI Registry Services (ARI) is today urging potential applicants to act now before the opening of the 90 day application window on 12 January 2012. more

New Zloader Campaign: Where Do IoCs Lead Us?

Zloader, a banking malware that steals sensitive user data, is back with a more sophisticated infection chain. It evades detection while exploiting Microsoft's digital signature verification method. more

CircleID Selects UltraDNS to Provide Advanced Managed DNS Services

UltraDNS, world's leading provider of Managed DNS services, today announced that CircleID, the pre-eminent online community for technical and political Internet discussions, has chosen UltraDNS to strengthen its online presence. more

Mitigating DDoS Attacks: A Global Challenge

On December 5, 2012, Public Interest Registry moderated an expert panel on "Mitigating DDoS Attacks: Best Practices for an Evolving Threat Landscape." The panel included representatives from Symantec, Afilias, Google, Neustar, VeriSign and the Electronic Frontier Foundation. Included is the video recording of the panel discussion. more

Exposing Chat Apps Exploited for Supply Chain Attacks

As far back as September 2022, Trend Micro reported that threat actors began exploiting chat apps Comm100 and LiveHelp100 to launch supply chain attacks. In a bid to help potential targets curb the problem, they publicized nine indicators of compromise (IoCs), specifically command-and-control (C&C) server addresses. more