Brand Protection

Sponsored
by

Noteworthy

Thousands of Third-Party Domains Target Super Bowl Betting Brands

Five Years of Domain Security Insights: CSC's Latest Findings on Global 2000 Companies

A Guide to Navigating the Chinese Market

Blogs

Towards a Generalised Threat-Scoring Framework for Prioritising Results From Brand Monitoring Programmes

The ability to rank results according to the level of threat they pose (based on factors such as, for example, the extent to which a webpage relates to a brand of interest) is a key component of many brand protection services. The prioritisation process has a number of purposes, including the identification of: (a) priority targets for further analysis; (b) candidates for content tracking (i.e. regular reinspection of content or configuration, and the generation of an alert if high-concern findings are identified) - as may be appropriate in cases where a domain name presents a high potential level of risk but is not currently associated with any live site content; and (c) priority targets for enforcement actions.

Beyond WHOIS: Rethinking Domain Verification in a Post-GDPR World

The introduction of GDPR in 2018, and the subsequent tightening of privacy regulations around the world, was a necessary step toward protecting user data. Consumers gained critical rights over their personal information, and companies were forced to adopt stronger standards for how they collect, store, and use that data. However, one unintended consequence has been the erosion of access to domain registration information once easily available through WHOIS databases.

Thousands of Third-Party Domains Target Super Bowl Betting Brands

When major events like the Super Bowl are on the horizon, cybercriminals exploit public trust by creating fraudulent domains for fake betting sites, phishing, and malware distribution. CSC's research into top online sportsbooks highlights the hidden risks of dormant domains, which, though inactive, can quickly be repurposed for cyber attacks. Overlooked yet dangerous, these domains play a key role in impersonation, misinformation, and scams targeting event-driven traffic, underscoring the need for continuous monitoring of lookalike, dropped, re-registered, and newly registered domains.

Time to Act as Apple Sets Wheels in Motion for Shorter Certificate Life Cycles

You may have read our previous blog about the pending reduction of digital certificate life cycles to just 90 days. This past weekend, the issue gained momentum at the Certification Authority Browser Forum when more detail was discussed following the proposed ballot to set a timeline for shorter lifetime certificates by Apple. This creates real urgency for organizations of all sizes to seriously consider and implement automation into their certificate life cycle management.

‘Notorious Hosting Providers’: An Overview of the Highest-Threat Hosts From IP-address Blacklist Analysis

One major element of many brand-protection programmes is the use of an algorithm to sort the findings identified through monitoring, according to their relevance or level of potential threat. This prioritisation process offers a number of benefits, including the identification of priority targets for further analysis, content tracking, or enforcement.

Br’AI’ve New World - Part 1: Brand Protection ‘Clustering’ as a Candidate Task for the Application of AI Capabilities

As counterfeit networks grow more elusive, AI-driven clustering could revolutionize brand protection. By linking disparate findings, identifying serial infringers, and enabling bulk enforcement, AI offers a smarter approach to monitoring and takedown efforts. Yet, challenges remain - from data reliability to analyzing complex content. Companies that master AI-driven clustering may gain a significant advantage in the fight against brand abuse.

Beyond WHOIS: CircleID and Edgemoor Research Institute Inaugural Event on Balancing Privacy and Legitimate Data Needs

The global debate over Internet privacy and security took center stage in a webinar hosted by CircleID in partnership with the Edgemoor Research Institute. The event marked the first in a series exploring the delicate balance between safeguarding personal data and ensuring legitimate access to domain name registration details. As governments, cybersecurity experts, law enforcement, and intellectual property holders grapple with the evolving regulatory landscape, Project Jake seeks to establish a framework that prioritizes policy clarity, efficiency, and adaptability.

Unregistered Gems Part 6: Phonemizing Strings to Find Brandable Domains

The UnregisteredGems.com series of articles explores a range of techniques to filter and search through the universe of unregistered domain names, in order to find examples which may be compelling candidates for entities looking to select a new brand name (and its associated domain). The previous instalment of the series looked at the categorisation of candidate names according to the phonetic characteristics of its constituent consonants, using a simple one-to-one mapping between each consonant and a corresponding phonetic group.

Unregistered Gems Part 5: Using Groupings to Find Brandable Domains

The initial instalment of my recent series of articles on domain name discovery1 considered the use of phonotactic analysis - that is, the measure of the similarity of a string to the 'corpus' of other words in a language - to identify available unregistered candidate domains which may be of interest for potential brandability.

A Review of the 2024 Threat Landscape and Implications for Domain Security

The cybersecurity landscape in 2024 has been characterised by unprecedented complexity and rapidly evolving threats, presenting significant challenges for organisations across all sectors. As the digital attack surface expands and threat actors employ increasingly sophisticated techniques, domain security has emerged as a critical component of a robust cybersecurity strategy.

Availability Analysis of Brandable Variant-String Domain Names

For any entity looking to launch a new company or other initiative, a primary requirement is often the selection of an appropriate brand name and the acquisition of a relevant associated domain name. In light of the increasing shortage of short, unregistered memorable names on popular domain name extensions (TLDs), many organisations are choosing to adopt novel or invented brand names and/or consider the use of alternative TLDs.

Enterprise Domain Stargazing: Understanding Your Company’s Galaxy of Domains

In CSC's recent insight paper, we address the trend that many business leaders today don't realize the extent to which their modern enterprise -- and its millions of digital assets -- rely on. It's a vast domain ecosystem that needs to be protected from online threats. Often, to better understand this need for domain security, we need to understand how critical and interconnected domains are within a business.

How Dormant Domains Can Be Weaponized During Events Like the 2024 U.S. Election

As with any high-stakes event, elections have become a prime target for cybercriminals seeking to exploit public trust through impersonation, misinformation, and scams. CSC's comprehensive research about the 2024 U.S. Election reveals the alarming role of dormant domains, which have the potential to be exploited for launching cyber attacks against political campaigns, organizations, and constituents.

Further Ideas in Mark Similarity Measurement

In the final three articles in my series looking at algorithms for measuring the similarity of marks, I extend the ideas to provide a more sophisticated and adaptable framework. Article 4 introduces a similarity score based on color distance in RGB space, offering a quantitative approach to trademark similarity. Article 5 refines word mark similarity by using the International Phonetic Alphabet to improve phonetic analysis. The final article presents a method for sorting colors by dominant shade, aiding in trademark review and potential guidelines for color mark protection.

Broadband Labels are Here

On October 10, all ISPs in the United States were supposed to have implemented and posted broadband labels. The labels were required as part of the Infrastructure Investment and Jobs Act. Large ISPs had to post labels six months ago, and now the requirement is for all ISPs. I looked at the ISPs in a few counties I'm very familiar with, and I found a few ISPs in each county that have not posted labels that I can find on their website.

News Briefs

GoDaddy Lists Controversial ‘.sucks’ Domain: Brands Advised to Bolster Monitoring

Amazon Gets FCC Approval to Deploy Its Project Kuiper Broadband Satellites

WIPO Becomes First Non-Chinese Entity to Provide Domain Dispute Resolution Services for China’s .cn

WIPO Reports Cybersquatting Cases Grew by 12% Reaching New Records in 2018

Amazon Gets the Green Light for .Amazon TLD Following Intense Negotiations Involving South America

Kodak Announces a Blockchain Platform Initiative for Image Rights Management

EFF Warns ICANN Not to Engage in Censorship, Says It Should Stick to Technical Role

Civil Society Groups Call for Deletion of Internet Filtering Provision in EU Copyright Proposal

EFF Cautions Against Unfair TLD Policies, Offers Advice on Choosing New gTLDs for Best Protection

Domain Registrations in New TLDs Overwhelmingly for Defensive Purposes, INTA Study

Cycling Legend Greg LeMond Sues Cybersquatters Upward of $6.6 Million

Feds Shut Down Largest File-Sharing Site KickassTorrents - Founder Arrested, Domains Seized

Thomson Reuters in Definitive Agreement to Sell Intellectual Property Unit Including MarkMonitor

UK Bill Ups Prison Term for Online Piracy from 2 to 10 Years

Internet Governance Forum USA 2016 on Thursday, July 14

ICANN Says It Will Not Get Directly Involved With Infringing Domains

WIPO Reports Rise in Cybersquatting Cases, Triggered by New gTLDs

TLD Operators Should Not Police Content, Says EFF

Google Received 65.9 Million Take Down Requests Last Month, Company Reports

US Should Take More Aggressive Counter-Measures On IP Theft, Including Use of Malware

Most Viewed

Most Commented

CSC Updates – Sponsor

A Guide to Navigating the Chinese Market

The Chinese market is the second largest in the world with an estimated GDP of $18 trillion. Over the past few decades, it has grown to be a powerhouse of manufacturing and technology. This has been coupled with a large increase in the internet penetration that now stands at 76%, which for a country of 1.4 billion people is a significant number of people online. more

Five Years of Domain Security Insights: CSC’s Latest Findings on Global 2000 Companies

This year marks the fifth annual release of CSC's "Domain Security Report," which continues to shed light on the evolving landscape of domain security among Global 2000 companies. more

Four Steps to Mitigate Subdomain Hijacking

The journey towards widespread Cloud adoption has significantly impacted domain name system (DNS) management practices. Initially, businesses operated their own data centers, however the shift towards external hosting providers has introduced complexities and increased the potential for DNS record mismanagement, and therefore, subdomain vulnerability. more

NIS2 and Its Implications for Global Brands

Last month, Stephanie Driver, CSC's marketing manager, spoke with Global Director of Security Services Mark Flegg and discussed the Network and Information Security Directive (NIS2) 2022, which comes into force in October 2024. more

Subdomain Hijacking in the News Again - What is It?

In recent news, more than 13,000 subdomains of brands were hijacked for a large spam campaign that "leverages the trust associated with these domains to circulate spam and malicious phishing emails by the millions each day, cunningly using their credibility and stolen resources to slip past security measures." more

Thoughts on RDRS for Brand Owners

This month, Stephanie Driver, CSC's marketing manager, spoke with Patrick Hauss, head of Corporate Development and Strategic Alliances EMEA, about the Internet Corporation for Assigned Names and Numbers (ICANN) Registration Data Request Service (RDRS) as part of an ongoing a series of interviews with CSC's Digital Brand services business experts, where we talk about industry issues across cybersecurity, domains, brand protection, and fraud protection. more

CSC Partners with NetDiligence to Help Mitigate Cyber Risks and Support the Cyber Insurance Ecosystem

CSC, an enterprise-class domain registrar and world leader in mitigating domain security, domain name system (DNS), and digital brand threats, today announces its partnership with NetDiligence®, a leader in cyber risk readiness and response solutions for the cyber insurance industry. more

Industry Updates

Participants – Random Selection