Category

Domain Name Monitoring
Amazon AWS leaked GoDaddy Business Secrets
GoDaddy is a well-known hosting provider and domain name registry, and is one of the world’s largest SSL certificate providers. They have millions of clients all over the globe. To be a little specific, they have almost 18 million customers, and more than 75 million domain names registered. And just recently, a bunch of their...
Continue Reading
Phishing Solution
Protecting a website As a website owner to promote and conduct transactions for your own business using the internet is beneficial to the business. A website is considered to be a company or an individual’s representative in the online world. As the perceived representation of an entity or individual it is logical to apply protection...
Continue Reading
Cybersquatting Domain Profiteering, Brand Protection
The Cyber world of Today The World Wide Web is a huge space where a lot of people gather, interact, educate, and etc. With a lot of activities which feed people’s minds and the ability to conduct a lot of transactions in the internet space, it is a pretty convenient space for the majority of...
Continue Reading
Domain name spaming
Phishing spam is often sent from specifically registered domain names and domain zones to increase the efficacy of the phishing attack. This means that current email authentication systems are readily bypassed. Phishing spam forms the first component of the social engineering attempt. The phishing message must appear like it has come from a legitimate and...
Continue Reading
APWG – Phishing Trends Activity Report
Anti-Phishing Working Group – Phishing Trends Activity Report – Q2 2016 Summary of Findings: The Retail/Service sector remained the most- targeted industry sector during the second quarter of 2016, suffering 43% of attacks The number of brands targeted by phishers in the second quarter remained consistent – ranging from 411 to 425 different brands each...
Continue Reading
DNS Hijacking and DNS Spoofing
DNS hijacking and spoofing DNS is the underlying directory framework of the Internet. It turns a web address into an IP address that ultimately directs the user to legitimate website. If this DNS gets hijacked or taken over by a hacker group, the web address can be redirected to a completely different website. This malicious...
Continue Reading
Phishing Solution
gTLDs Phishing, Fraud, Abuse Observations – Top Level Domains (TLDs), such as .com, .org, .biz, .net, a part of the domain name that is installed in the root zone, now come in many different variations and flavours – such as generic TLDs (gTLDS), Country-Code TLDs (ccTLDS). These new TLDS have opened up the Domain Name...
Continue Reading
Phishing Solution
Domain shadowing provides the cybercriminal a series of methodologies to manipulate a genuine domain registrant account allowing the creation of fake subdomains and disrupting DNS configurations for malicious purposes. Our resources show that domain shadowing has now become a greater challenge amongst our client’s and their peers over the previous 12 months. This is a...
Continue Reading

Categories