The DomainTools Report: Spring 2023 Edition
The most recent DomainTools Report examines hotspots of malicious Internet infrastructure by TLD, IP and name server ASN, IP hosting country, domain registrar, and SSL certificate issuer.
The most recent DomainTools Report examines hotspots of malicious Internet infrastructure by TLD, IP and name server ASN, IP hosting country, domain registrar, and SSL certificate issuer.
Key Takeaways From the SolarWinds Breach The SolarWinds hack has presented a cybersecurity reckoning at a scale never before seen for the US government and private enterprises. While the width …
Blocking against all phishing attempts is costly, time intensive and arguably impossible. This paper will discuss how to get ahead of Phishing scams and the spear phisher’s infrastructure and techniques. …
In recent years, organizations around the world realized that a new era of cyber threats had dawned. Ransomware has advanced significantly and is now capable of taking out infrastructure and …
There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus on are harder to find. In …
Cyberattacks are a top priority in most IT organizations; the risk associated with ransomware attacks, data breaches, business email compromise, and supply chain attacks has garnered that significant attention be …
Is it possible to overcome the daunting challenge of knowing everything that’s going on inside and outside the network? Tarik Saleh, Senior Security Engineer at DomainTools believe the answer is …
There is an increasing chasm between the number of qualified cybersecurity professionals and the number of people needed to fill those roles. DomainTools is a vendor that seeks to address …
Historically, security managers had the challenge of convincing C-Suite leaders and boards of directors of existing or potential threats. While those days are not necessarily long-gone, the persistence of ransomware …
Few topics in the field of Cyber Threat Intelligence (CTI) prompt as much passion and debate as the concept of threat attribution. From numerous conference talks, to blogs and papers, …