Cybersecurity

Sponsored
by

Cybersecurity / Industry Updates

We Detected and Analyzed Thousands of CCTV-, Firewall-, and SCADA-themed Domains & Subdomains

Did you know that a comprehensive subdomain database can give you 69,383 fully qualified domain names (FQDNs) with the string "firewall," 241,654 FQDNs for "cctv," and 19,048 FQDNs for "scada"? That data can give cybersecurity researchers possible starting points for an article or even a full-blown research paper. more

DNS Over HTTPS: Spanish Version of eco Discussion Paper on DoH Available

Throughout the history of the Internet, traditional DNS traffic - for example, when a user types a website name into a browser - has largely been unencrypted. The DNS over HTTPS (DoH) protocol, which first emerged in 2018, makes use of the well-known secure HTTPS web protocol to change that. more

How Reverse IP Lookup API Can Help Detect Connected Domains

In 2020, reports say 94% of malware were delivered via email. Phishing remains a threat, as it accounts for more than 80% of security incidents that can cost victims almost US$18,000 per minute. more

What Is a VPN Detection API? How Does It Work?

Privacy is of great concern to a majority of Internet users -- and legitimately so. After all, not all of the companies that handle personal data reveal where they use the information. Privacy is one of the primary reasons for the use of VPNs, proxies, and even Tor. more

Come April, Nothing Is Certain Except Phishing and Taxes

In the past years, threat actors have made it a point to prey on U.S. taxpayers using phishing emails supposedly from the Internal Revenue Service (IRS). The goal is often to trick victims into giving their login credentials to various platforms. This year is no different. more

90-Day Digital Certificate Life Cycles: Get Ahead of the Curve Now

In August 2020, we wrote an article on preparing for the reduction of certificate life cycles from two years to one. Discussions continue, and given the push for shorter certificate terms by the CA/B Forum - in particular the browsers - we predict the move to lower certificate life cycles will continue, and that terms will be reduced to 90 days within the next 24 months. more

Expanding the List of Artifacts for the Recent JPMorgan Chase Squatting Campaign

On 13 March, IBM X-Force Exchange published nine artifacts -- three domain names and six IP addresses -- related to a squatting campaign targeting JPMorgan Chase and its stakeholders. We dug deeper into the list in hopes of publicizing additional artifacts that users may need to be wary of. more

LexisNexis Announces Alliance With Appdetex to Bring Online Brand Protection to Europe, Middle East

Today, LexisNexis announced its alliance with Appdetex to bring online brand protection to Europe and the Middle East. This expansion with LexisNexis will enable a broader reach for us to help protect the reputation, relationships, and revenue online of global customers. more

The i2Coalition Invites the Public to Help Shape the Future of VPNs

Virtual Private Networks help ensure data flows between endpoints are private and secure. This means VPN users can enhance their online anonymity, bypass geographic restrictions, secure data transfers, and more. And yet, there are still legitimate concerns that a small number of VPNs - either accidentally or intentionally - expose users to greater risk than if they hadn't used a VPN at all. more

An In-Depth Look at the Risks Kozow.com Subdomains May Pose to Internet Users

Kozow[.]com hosts the website of free dynamic Domain Name System (DNS) service provider Dynu Systems. It has been cited for ties to several malicious activities over the past few months. To see if it would be a good idea for organizations to consider blocking the domain from their networks, we collated a list of kozow[.]com subdomains and subjected them to deeper scrutiny. more