This article has been indexed from CircleID: Cybercrime Pride month is celebrated worldwide. While it’s meant to be a time of celebration for members of the LGBTQ community and their families and supporters, its popularity has also made it a…
Category: CircleID: Cybercrime
Could the LGBTQ Community Be a Target of Internet Threat Actors?
This article has been indexed from CircleID: Cybercrime Pride month is celebrated worldwide. While it’s meant to be a time of celebration for members of the LGBTQ community and their families and supporters, its popularity has also made it a…
Domains Are a Critical Component of Your Enterprise Risk Management
This article has been indexed from CircleID: Cybercrime A recent report “Domain Security: A Critical Component of Enterprise Risk Management” published by the Interisle Consulting Group highlights why domain security should be a critical component of enterprise risk management, a…
Are There More Properties Connected to the Pareto Botnet?
This article has been indexed from CircleID: Cybercrime The initial findings used to uncover more Pareto botnet-related artifacts were collated by WhoisXML API security researcher Dancho Danchev. The Pareto botnet, known for using almost a million infected Android devices to…
The Importance of Understanding Attacker Target Selection
This article has been indexed from CircleID: Cybercrime There’s a bit of a debate going on about whether the Kaseya attack exploited a 0-day vulnerability. While that’s an interesting question when discussing, say, patch management strategies, I think it’s less…
A Glimpse of Big Telcos’ Domains and Subdomains Footprints
This article has been indexed from CircleID: Cybercrime Telecommunications companies are a favored cyberattack target. After all, telcos build, control, and operate critical infrastructure that almost everyone uses to communicate. They also store large amounts of sensitive data that could…
Return on Investment: Proving That Protection Pays
This article has been indexed from CircleID: Cybercrime Brand protection costs money and requires a big investment of time and effort. Because of that, brand owners are tasked with proving to management that the return on investment is worth it…
More from DarkSide? We Ran an Analysis of Additional Identified Artifacts
This article has been indexed from CircleID: Cybercrime On 14 May 2021, Analyst1 security researchers released a detailed report on the DarkSide cybercriminal gang, which is believed to be responsible for ransomware attacks targeting the Colonial Pipeline. Part of the…
Internet Threats Go Viral – Companies Must React to Keep Brands Secure
This article has been indexed from CircleID: Cybercrime The year 2020 saw a marked increase in fraudulent domain registrations, phishing attacks, hacks and hijacking attempts, as well as the sale of counterfeit goods. Companies must protect themselves from revenue and…
ZeuS, Still Alive and Kicking in the Form of Jabber ZeuS?
This article has been indexed from CircleID: Cybercrime Thanks to Dancho Danchev, WhoisXML API’s DNS Threat Researcher for the original investigations available here and led to the creation of this post. ZeuS malware traces its origin as far back as…
Examining Real Examples of DNS Abuse: A Summary Overview of the 2nd DNS Abuse Forum
This article has been indexed from CircleID: Cybercrime DNS Abuse Forum 2: Exploring the Edges to Reach Consensus – Discussions around the prevalence and mitigation of DNS Abuse frequently return to differences in its definition. Rather than avoid the issue,…
Examing Real Examples of DNS Abuse: A Summary Overview of the 2nd DNS Abuse Forum
This article has been indexed from CircleID: Cybercrime DNS Abuse Forum 2: Exploring the Edges to Reach Consensus – Discussions around the prevalence and mitigation of DNS Abuse frequently return to differences in its definition. Rather than avoid the issue,…
SideWinder DNS Blackholes Uncovered with Threat Intelligence Platform
This article has been indexed from CircleID: Cybercrime A Domain Name System (DNS) blackhole is essentially a DNS server that gives false results for domain names. Also known as a “sinkhole server,” an “Internet sinkhole,” or a “DNS sinkhole,” threat…
Your Cybersecurity is Only as Strong as Your Weakest Vendor
This article has been indexed from CircleID: Cybercrime Managing the risk of third parties has become a compliance focus for many large organizations. Companies even work with third-party service providers and external vendors just to manage this risk. The recent…
Vendor Selection Matters in the Domain Registrar Ecosystem
This article has been indexed from CircleID: Cybercrime Domain name abuse is one of the most dangerous and under-regulated issues in digital business security today. Many of the largest companies in the world still lack basic domain security protocols, making…
Given a Malicious Email Address, What Can You Discover with Maltego’s WhoisXML API Transforms?
This article has been indexed from CircleID: Cybercrime Thanks to Dancho Danchev, WhoisXML API’s DNS Threat Researcher, for the original investigations available here, which led to the creation of this post. On any given day, most of us get more…
Crypto-Related Domains and Subdomains: What’s Underneath the 30K of Them?
This article has been indexed from CircleID: Cybercrime Note: A special thanks to Ed Gibbs, WhoisXML API’s Advanced Threat Researcher & Technical Account Manager, for his help compiling the domain and subdomain files used in this post. Cryptocurrencies keep making…
Close to Half of US East Coast Fuel Supply Shutdown Due to Ransomware Cyberattack
Colonial system affected by the cyberattack. Colonial is the largest refined products pipeline in the U.S., transporting more than 100 million gallons, or 2.5 million barrels, per day. Its pipeline spans more the 5,500 miles throughout the Southern and Eastern…
A Deep Dive into Known Magecart IoCs: What Are the Connected Internet Properties?
Magecart-style attacks have been around for a while and continue to be mentioned in the news in 2021. We found and collected a list of 20 domain names that have been mentioned in the past months on VirusTotal as Magecart…
COVID-19-Related Bulk Domain Registrations: A Possible Case of DNS Abuse?
Read the original article: COVID-19-Related Bulk Domain Registrations: A Possible Case of DNS Abuse? Addressing Domain Name System (DNS) abuse has been a priority of the Internet Corporation for Assigned Names and Numbers (ICANN), notably since March 2020. During its…
Trusted Notifiers and the Future of DNS Abuse
Read the original article: Trusted Notifiers and the Future of DNS Abuse Co-authored by Mark W. Datysgeld and Ron Andruff Efforts have been ongoing in the ICANN community to develop a better understanding of its role in the combat of…
What Are the Connections to Identified Hafnium Malicious IP Addresses?
Read the original article: What Are the Connections to Identified Hafnium Malicious IP Addresses? Cyber attackers are very skilled at infiltration. They’d find ways into a house through cracks and holes that the homeowner doesn’t know about. Analogically speaking, that’s…
Together for the Good of the Internet: eco Complaints Office Registers More Reports Than Ever Before
Read the original article: Together for the Good of the Internet: eco Complaints Office Registers More Reports Than Ever Before For 25 years, the Complaints Office of eco — Association of the Internet Industry has been successfully combatting illegal content…
How Reverse IP Lookup API Can Help Detect Connected Domains
Read the original article: How Reverse IP Lookup API Can Help Detect Connected Domains In 2020, reports say 94% of malware were delivered via email. Phishing remains a threat, as it accounts for more than 80% of security incidents that…
Come April, Nothing Is Certain Except Phishing and Taxes
Read the original article: Come April, Nothing Is Certain Except Phishing and Taxes In the past years, threat actors have made it a point to prey on U.S. taxpayers using phishing emails supposedly from the Internal Revenue Service (IRS). The…
The Path to Combatting Domain Abuse
Read the original article: The Path to Combatting Domain Abuse On March 16th, the DNS Abuse Institute hosted a forum on the State of DNS Abuse, discussing Trends from the last three years and the current landscape. Completely eradicating malware,…
Four-Pronged Approach to Keep Your Domain Names and DNS Secure from Cyberattacks
Read the original article: Four-Pronged Approach to Keep Your Domain Names and DNS Secure from Cyberattacks Domain names, domain name systems (DNS), and digital certificates are fundamental components of the most important applications that enable your company to conduct business…
An In-Depth Look at the Risks Kozow.com Subdomains May Pose to Internet Users
Read the original article: An In-Depth Look at the Risks Kozow.com Subdomains May Pose to Internet Users Kozow[.]com hosts the website of free dynamic Domain Name System (DNS) service provider Dynu Systems. It has been cited for ties to several…
Why Protecting Your Brand from Online Fraud is More Important Than Ever
Read the original article: Why Protecting Your Brand from Online Fraud is More Important Than Ever In a recent CSC webinar, we welcomed information security expert Robin Schouten of ABN AMRO Bank N.V. to share his thoughts and experiences of…
The Future of Europe’s Fight Against Child Sexual Abuse
Read the original article: The Future of Europe’s Fight Against Child Sexual Abuse Like much of how the Internet is governed, the way we detect and remove child abuse material online began as an ad hoc set of private practices.…
SolarWinds Cyber Intel Analysis Part 2: A Look at Additional CISA-Published IoCs
Read the original article: SolarWinds Cyber Intel Analysis Part 2: A Look at Additional CISA-Published IoCs A few weeks back, we added unpublicized artifacts to the list of indicators of compromise (IoCs) published by both FireEye and Open Source Context…
The Netizen’s Guide to Reboot the Root (Part II)
Read the original article: The Netizen’s Guide to Reboot the Root (Part II) Rampant dysfunction currently plagues the Internet’s root zone where a predatory monopolist has captured ICANN and is bullying stakeholders. This harms the public interest and must be…
Notorious Markets, Scams and Implications for Brands
Read the original article: Notorious Markets, Scams and Implications for Brands On January 14, 2021, the Office of the United States Trade Representative (USTR) released its 2020 Review of Notorious Markets for Counterfeiting and Piracy (the Notorious Markets List, or…
Cyber Threat Intel Analysis and Expansion of SolarWinds Identified IoCs
Read the original article: Cyber Threat Intel Analysis and Expansion of SolarWinds Identified IoCs The SolarWinds hack affected several government agencies and tech companies in the U.S. and worldwide. The sophisticated malware attack is believed to have compromised the trusted…
All Roads Lead to… Domains: Why the Humble Domain Name is the Foundation of Your Online Security
Read the original article: All Roads Lead to… Domains: Why the Humble Domain Name is the Foundation of Your Online Security For most people, a domain is just an address that you type into a browser, but for businesses, domain…
Enriching Intrusion Detection and Prevention Systems with IP and Domain Intelligence
Read the original article: Enriching Intrusion Detection and Prevention Systems with IP and Domain Intelligence Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), collectively called “intrusion detection and prevention systems (IDPSs),” monitor network traffic to stave off unauthorized access.…
Reshaping Cyberspace: Beyond the Emerging Online Mercenaries and the Aftermath of SolarWinds
Read the original article: Reshaping Cyberspace: Beyond the Emerging Online Mercenaries and the Aftermath of SolarWinds Ahmed Mansoor is an internationally recognized human rights defender based in the Middle East and recipient of the Martin Ennals Award (sometimes referred to as a…
What Are the Connected Assets of Confirmed Fake FBI Domains?
Read the original article: What Are the Connected Assets of Confirmed Fake FBI Domains? Two months ago, the Federal Bureau of Investigation (FBI) alerted the public to a list of domains that could easily be mistaken to be part of…
QAnon and 8Chan Digital Footprint Analysis and Investigation Expansion
Read the original article: QAnon and 8Chan Digital Footprint Analysis and Investigation Expansion In October, Brian Krebs reported that several websites related to 8Chan and QAnon went offline, albeit only briefly. That happened when the entity protecting them from distributed…
Attack Surface Discovery: A Review of FINRA-lookalike Domain and Linked IoCs
Read the original article: Attack Surface Discovery: A Review of FINRA-lookalike Domain and Linked IoCs NPOs and NGOs are no stranger to cyber attacks targeting their members. A few examples of recent phishing campaign subjects include: Mercy Corps and the…
A Brief OSINT Analysis of Charming Kitten IoCs
Read the original article: A Brief OSINT Analysis of Charming Kitten IoCs Charming Kitten is a cybercriminal group believed to be of Iranian origin, which was first seen in 2014, but had been active for years after the initial detection.…
Revisiting APT1 IoCs with DNS and Subdomain Intelligence
Read the original article: Revisiting APT1 IoCs with DNS and Subdomain Intelligence Cyber espionage is a type of cyber attack that aims to steal sensitive and often classified information to gain an advantage over a company or government. The 2020…
97% of All Global 2000 Companies at Risk from SAD DNS Attack
Read the original article: 97% of All Global 2000 Companies at Risk from SAD DNS Attack Co-authored by Ken Linscott, product director, Domains and Security, Mark Flegg, global director, Security Services, and Letitia Thian, marketing manager There is a new…
How Much of a Fortune 500 Company’s Digital Footprint Can Be Publicly Attributed to It?
Read the original article: How Much of a Fortune 500 Company’s Digital Footprint Can Be Publicly Attributed to It? Not all of the domains that contain a company’s brand are under its control. A portion of them — sometimes even…
Cybersecurity Considerations in the Work-From-Home Era
Read the original article: Cybersecurity Considerations in the Work-From-Home Era Verisign is deeply committed to protecting our critical internet infrastructure from potential cybersecurity threats, and to keeping up to date on the changing cyber landscape. Over the years, cybercriminals have…
Internet Governance and the Universal Declaration of Human Rights, Part 6: Articles 18-19
Read the original article: Internet Governance and the Universal Declaration of Human Rights, Part 6: Articles 18-19 Articles 18-19: Freedoms of Thought and Opinion. Co-authored by Klaus Stoll and Prof Sam Lanfranco.1 Internet Governance, like all governance, needs guiding principles…
DDoS Attacks Are Surging Both in Frequency and Sophistication
Read the original article: DDoS Attacks Are Surging Both in Frequency and Sophistication Network-Layer DDoS Attacks – Distribution by Month / Cloudflare Cloudflare’s new report warns about the significant increase of DDoS attacks and their level of sophistication. The numbers…
Holiday Shoppers Beware: Tips on Protecting Brand Owners and Consumers from Domain Security Threats
Read the original article: Holiday Shoppers Beware: Tips on Protecting Brand Owners and Consumers from Domain Security Threats Co-authored by CSC’s Global Director Vincent D’Angelo, Senior Global Brand Security Advisor Quinn Taggart and Global Marketing Leader Sue Watts. With the…
Business Email Compromise Attacks: The Big Phishing Scam That’s Easily Missed
Read the original article: Business Email Compromise Attacks: The Big Phishing Scam That’s Easily Missed Business email compromise (BEC) attacks are arguably the most sophisticated of all email phishing attacks, and some of the most costly. From 2016-2018, BEC alone…
An Investigative Analysis of the Silent Librarian IoCs
Read the original article: An Investigative Analysis of the Silent Librarian IoCs The Silent Librarian advanced persistent threat (APT) actors have been detected once again, as the academic year started in September. With online classes increasingly becoming the norm, the…
10 Common Digital Threats to Businesses
Read the original article: 10 Common Digital Threats to Businesses The year 2020 has created an increased impetus for change — especially as companies embrace digital transformation at an accelerated pace. Cybercriminals have also upped their game, switching their attention…
ICANN Doubles Down on Technical Internet Governance Label: What Are the Implications?
Read the original article: ICANN Doubles Down on Technical Internet Governance Label: What Are the Implications? Back in September of 2020, ICANN CEO Göran Marby wrote a blog post discussing the implementation of “a common strategy for Internet governance (IG)…
Attack Surface Analysis: Most Blacklisted IP Addresses Scrutinized
Read the original article: Attack Surface Analysis: Most Blacklisted IP Addresses Scrutinized The attack surface of every Internet user gets wider every day, but it doesn’t mean there’s nothing that can be done about it. For one, analyzing possible attack…
Third-Party Vendor Risk Management: A Look into Top Couriers’ Digital Footprint
Read the original article: Third-Party Vendor Risk Management: A Look into Top Couriers’ Digital Footprint Just as no man is an island, no company can perform core functions without other organizations’ help. This fact is highlighted in today’s age of…
Third-Party Vendor Risk Management: A Look into Top Couriers’ Digital Footprint
Read the original article: Third-Party Vendor Risk Management: A Look into Top Couriers’ Digital Footprint Just as no man is an island, no company can perform core functions without other organizations’ help. This fact is highlighted in today’s age of…
A Brief Look at the Domain Attack Surface of Streaming Media Companies
Read the original article: A Brief Look at the Domain Attack Surface of Streaming Media Companies The term “attack surface” is often heard in cybersecurity conversations. It refers to the sum of all possible attack vectors or the vulnerabilities that…
Attack Surface Reduction: Scrutiny of the Top Payment Processing Companies
Read the original article: Attack Surface Reduction: Scrutiny of the Top Payment Processing Companies Almost every transaction on the Internet is riddled with risks, and the use of online payment processing platforms is no exception. With more people opting to…
Attack Surface Reduction: Scrutiny of the Top Payment Processing Companies
Read the original article: Attack Surface Reduction: Scrutiny of the Top Payment Processing Companies Almost every transaction on the Internet is riddled with risks, and the use of online payment processing platforms is no exception. With more people opting to…
Enriching IP Blacklists Using a Reverse IP/DNS Database
Read the original article: Enriching IP Blacklists Using a Reverse IP/DNS Database Every organization faces two kinds of cyber threats daily — “known” and “unknown” ones. Known threats are those that security experts have discovered, often published in blogs and…
Enriching IP Blacklists Using a Reverse IP/DNS Database
Read the original article: Enriching IP Blacklists Using a Reverse IP/DNS Database Every organization faces two kinds of cyber threats daily — “known” and “unknown” ones. Known threats are those that security experts have discovered, often published in blogs and…
CSC’s Research on Election-Related Domains Aligns with Recent FBI and CISA Warning
Read the original article: CSC’s Research on Election-Related Domains Aligns with Recent FBI and CISA Warning Public Service Announcement (Source: FBI & CISA / OCTOBER 2, 2020) Following a public announcement from the FBI and CISA warning the public to…
US Election-Related Web Properties Prone to Fraud and Misinformation Due to Lack of Domain Security
Read the original article: US Election-Related Web Properties Prone to Fraud and Misinformation Due to Lack of Domain Security Co-authored by CSC’s Sue Watts and Quinn Taggart. The risks of fraud and disinformation in the U.S. election process have been…
Beefing Up Third-Party Risk Management with Reverse DNS Search
Read the original article: Beefing Up Third-Party Risk Management with Reverse DNS Search Most businesses rely on third-party entities to outsource certain functions, save on costs, and strengthen their cybersecurity capabilities. While working with external providers makes perfect business sense,…
Strengthening Brand Protection with Subdomain Lookups: A Short Study
Read the original article: Strengthening Brand Protection with Subdomain Lookups: A Short Study Threat actors usually ride on a brand’s popularity to make phishing campaigns believable. A common approach involves registering typosquatting domains that closely resemble those of the legitimate…
Phishing 2020: A Concentrated Dose of Badness
Read the original article: Phishing 2020: A Concentrated Dose of Badness How much phishing is there? Where is it occurring, and why? How can it be reduced? I and my colleagues at Interisle Consulting have just published a new study…
CENTR Has Released an Animated Video on ccTLDs and Their Technical Role Concerning Content
Read the original article: CENTR Has Released an Animated Video on ccTLDs and Their Technical Role Concerning Content CENTR explains the role of the DNS in tackling illegal content online The Council of European National Top-Level Domain Registries (CENTR) released…
New Data Reveals Phishing Attacks Are Bigger Than Reported, Exact Size of Problem Unknown
Read the original article: New Data Reveals Phishing Attacks Are Bigger Than Reported, Exact Size of Problem Unknown Attack Activity by Day – Phishing is lowest on the weekends when potential victims are away from their email. Phishing then ramps…
WHOIS History Footprint Tells Us More about the Man Behind the Biggest BLM Scam
Read the original article: WHOIS History Footprint Tells Us More about the Man Behind the Biggest BLM Scam In 2018, the biggest scam that banked on the Black Lives Matter movement was exposed. An Australian National Union Workers official named…
How Can Greater Security, Safety and Trust in the Internet Be Created?
Read the original article: How Can Greater Security, Safety and Trust in the Internet Be Created? In the coming days, the Internet Governance Forum Dynamic Coalition on Internet Standards, Security and Safety will be announced on the IGF website. The…
Afilias Joins Global Encryption Coalition to Promote Internet Security
Read the original article: Afilias Joins Global Encryption Coalition to Promote Internet Security Afilias, the world’s second largest domain name registry, today announced that it has joined the Global Encryption Coalition (globalencryption.org). The Global Encryption Coalition promotes and defends the…
Received a Questionable Email From NABP? It May Be Illegal Spoofing
Read the original article: Received a Questionable Email From NABP? It May Be Illegal Spoofing Has your organization recently received an email claiming to be from NABP’s Internet Drug Outlet Identification Program (IDOI)? If so, it is possible that someone…
Fraudulent Transfer: Recovering Stolen Domain Names
Read the original article: Fraudulent Transfer: Recovering Stolen Domain Names Either because of laxness on the part domain name holders or cunning on the part of thieves, registrars have been duped into transferring domain names to fraudsters’ accounts. I discussed…
How Global Trends Arising from COVID-19 May Influence Online Brand Protection Strategies
Read the original article: How Global Trends Arising from COVID-19 May Influence Online Brand Protection Strategies Co-authored by Alban Kwan, CSC East Asia Regional Director and Lan Huang, CSC Domain and Brand Abuse Enforcement Expert. We’re in an interregnum where…
The State of DNS Abuse: Moving Backward, Not Forward
Read the original article: The State of DNS Abuse: Moving Backward, Not Forward ICANN’s founding promise and mandate are optimistic — ensure a stable and secure internet that benefits the internet community as a whole. Recent months, however, have highlighted…
Beware of Abandoned Domain Names in this Turbulent Time and as the Global Economy Changes
Read the original article: Beware of Abandoned Domain Names in this Turbulent Time and as the Global Economy Changes The outbreak of COVID-19 has caused worldwide disruption — for whole nations and their economies. Unfortunately, there will be some side…
Freedom of Expression Part 2: Blocking, Filtering and Removing Online Content
Read the original article: Freedom of Expression Part 2: Blocking, Filtering and Removing Online Content The Internet is a catalyst for what has revolutionised and transformed human societies in giving extraordinary access to information that has catapulted development and economic…
Freedom of Expression Part 3: Child Pornography, Manga, Anime, Obscene Publication
Read the original article: Freedom of Expression Part 3: Child Pornography, Manga, Anime, Obscene Publication At the 44th Session of the Human Rights Council, we heard how 1 billion children in 2019 who were subjected to various forms of violence…
Trump Admin Ramping Up Attacks on GDPR – Says It Helps Cybercrime, Threatens Public Health
Read the original article: Trump Admin Ramping Up Attacks on GDPR – Says It Helps Cybercrime, Threatens Public Health While the EU is boasting about the success of its flagship privacy law, the General Data Protection Regulation (GDPR), the U.S.…
Typosquatting Data Feed Can Enhance Lloyds Bank’s Typosquatting Protection
Read the original article: Typosquatting Data Feed Can Enhance Lloyds Bank’s Typosquatting Protection Typosquatting are among the cybersecurity threats that deserve a closer look in the financial sector. In fact, the early detection of typosquatting domains can help financial institutions…
60+ PayPal Potential Typosquatting Domains Detected in the Beginning of June
Read the original article: 60+ PayPal Potential Typosquatting Domains Detected in the Beginning of June PayPal is still one of the most imitated brands on the Internet. From 1-8 June 2020, the Typosquatting Data Feed detected a total of 64…
Hundreds of “George Floyd” and “Black Lives Matter” Domain Names Appear in the DNS
Read the original article: Hundreds of “George Floyd” and “Black Lives Matter” Domain Names Appear in the DNS Trending news and global events impact domain registration behaviors. We observed a slew of coronavirus-themed domain name registrations, for example, as early…
Typosquatting Domains Every AppleID Owner Should Avoid
Read the original article: Typosquatting Domains Every AppleID Owner Should Avoid On 29 April 2020, IBM X-Force warned users of an AppleID typosquatting campaign specifically targeting members of the media sector. Those affected were advised to stay away from three…
Shopping and the Pandemic: Increased Reliance on Mobile Apps
Read the original article: Shopping and the Pandemic: Increased Reliance on Mobile Apps Savvy retailers who expanded their offerings to include e-commerce app options have reaped the benefits of this forethought during the coronavirus outbreak. As the pandemic has driven more…
Typosquatting Protection: A Look into Instagram-Themed Domain Names
Read the original article: Typosquatting Protection: A Look into Instagram-Themed Domain Names On Instagram’s Help Center, there are sections solely dedicated to Intellectual Property. The social media giant also provided avenues for reporting account impersonation and trademark violations. And with…
Investigating Typo Domains Beyond Credit Suisse’s Spying Scandal
Read the original article: Investigating Typo Domains Beyond Credit Suisse’s Spying Scandal In 2019, Credit Suisse was hit by a spying scandal that quickly spiraled into several things — a public confrontation, a resignation, and a death. Iqbal Khan, the…
IP Geolocation Intelligence: An Aid Against Location-Based Threats?
Read the original article: IP Geolocation Intelligence: An Aid Against Location-Based Threats? Cybercrime is borderless. Just like marketing teams use location-based targeting to create a deeper connection with customers through content personalization, cybercriminals adjust their attacks to exploit their victims’…
Surveillance Capitalist in Chief
Read the original article: Surveillance Capitalist in Chief Co-authored by Klaus Stoll and Professor Sam Lanfranco. Surveillance capitalism monetizes private data that it collects without consent of the individuals concerned, data to analyze and sell to advertisers and opinion-makers. There…
Trust Has Eroded Within the Cybercriminal Underground Causing a Switch to Ecommerce Platforms
Read the original article: Trust Has Eroded Within the Cybercriminal Underground Causing a Switch to Ecommerce Platforms Popular underground goods and services / Trend Micro, May 26, 2020 New data released today indicates that trust has eroded among criminal interactions,…
Trust Has Eroded Within the Cybercriminal Underground Causing a Switch to Ecommerce Platforms
Read the original article: Trust Has Eroded Within the Cybercriminal Underground Causing a Switch to Ecommerce Platforms Popular underground goods and services / Trend Micro, May 26, 2020 New data released today indicates that trust has eroded among criminal interactions,…
Domain and IP Intelligence Checks Following the Launch of the COVID-19 Solidarity Response Fund
Read the original article: Domain and IP Intelligence Checks Following the Launch of the COVID-19 Solidarity Response Fund COVID-19 caught everyone by surprise. No one thought a virus could inflict so much damage to the global economy, but it has.…
Newly Registered Domains Database Shows Threat Actors Exploit the Need for N95 Masks amid the Pandem
Read the original article: Newly Registered Domains Database Shows Threat Actors Exploit the Need for N95 Masks amid the Pandem As the coronavirus infection toll continues to rise, many countries are scrambling to get their hands on medical-grade N95 face…
How to Avoid Phishing Campaigns Targeting CARES Act Recipients
Read the original article: How to Avoid Phishing Campaigns Targeting CARES Act Recipients Amid the spread of COVID-19, the world continues to suffer dire health and economic consequences. To help, national governments have released funds to support companies and laid-off…
Under the Hood of 3M- and 3M Mask-Themed Recently Registered Domains
Read the original article: Under the Hood of 3M- and 3M Mask-Themed Recently Registered Domains The rapid spread of COVID-19 had people scrambling to protect themselves. Among different means of protection, besides imposed community quarantines and social-distancing measures, it has…
Under the Hood of 3M- and 3M Mask-Themed Recently Registered Domains
Read the original article: Under the Hood of 3M- and 3M Mask-Themed Recently Registered Domains The rapid spread of COVID-19 had people scrambling to protect themselves. Among different means of protection, besides imposed community quarantines and social-distancing measures, it has…
Domain Intelligence Shows Cybercriminals May Abuse Video-Conferencing Services’ Brand Names
Read the original article: Domain Intelligence Shows Cybercriminals May Abuse Video-Conferencing Services’ Brand Names As a huge chunk of the world’s population is staying at home because of social distancing measures, video-conferencing businesses saw an opportunity to expand their freemium…
How Cyber Threat Intelligence Feeds Can Support MSSPs
Read the original article: How Cyber Threat Intelligence Feeds Can Support MSSPs Organizations that don’t have a dedicated pool of cybersecurity experts often hire managed security service providers (MSSPs) to help them ward off attempts and attacks. Yet in today’s…
Are We Ready for a Post-COVID-19 Cybersecurity Landscape?
Read the original article: Are We Ready for a Post-COVID-19 Cybersecurity Landscape? There’s an old adage that history repeats itself. This certainly holds true for the fact that every time there has been a major crisis, cybercriminals have been keener…
Measuring Abuse: How Much COVID-Related Abuse Is There, Really?
Read the original article: Measuring Abuse: How Much COVID-Related Abuse Is There, Really? Like measuring COVID’s impact, so too measuring the impact of COVID-related abuse on the Internet is difficult, there are those that would foolishly dismiss the danger entirely,…
Combating COVID-19 Cybercrime – What Internet Infrastructure Providers Like Afilias Are Doing
Read the original article: Combating COVID-19 Cybercrime – What Internet Infrastructure Providers Like Afilias Are Doing Written by Dr. James Galvin, Director, Technical Standards and Strategic Relationships at Afilias. The ongoing Coronavirus pandemic has been fertile ground for scams and…
Brand Monitor and Typosquatting Data Feed: Two Assets to Support Spear-Phishing Prevention
Read the original article: Brand Monitor and Typosquatting Data Feed: Two Assets to Support Spear-Phishing Prevention Spear-phishing email attacks pose a significant challenge to most organizations. A successful attempt can cost a company an average of US$1.6 million per incident.…