Dynadot

malware

Spaceship Spaceship
  1. News

    alert Hackers Target Latin America with Suspended Domains

    A recent phishing campaign targeting Latin America utilized emails with ZIP attachments containing an HTML file disguised as an invoice using free, temporary email addresses with the domain “temporary.link” and spoofing the User-Agent field in the header to indicate use of Roundcube Webmail, a...
  2. News

    alert Hackers Target Latin America with Suspended Domains

    A recent phishing campaign targeting Latin America utilized emails with ZIP attachments containing an HTML file disguised as an invoice using free, temporary email addresses with the domain “temporary.link” and spoofing the User-Agent field in the header to indicate use of Roundcube Webmail, a...
  3. News

    news Federal Authorities Seize Internet Domain Selling Malware

    As part of an international law enforcement effort, federal authorities in Los Angeles this week seized an internet domain that was used to sell computer malware used by cybercriminals to take control of infected computers and steal a wide array of information. A seizure warrant approved by a...
  4. News

    news Federal Authorities Seize Internet Domain Selling Malware

    As part of an international law enforcement effort, federal authorities in Los Angeles this week seized an internet domain that was used to sell computer malware used by cybercriminals to take control of infected computers and steal a wide array of information. A seizure warrant approved by a...
  5. News

    security Why Domain Name System (DNS) security is critical for the healthcare industry

    The Domain Name System (DNS) has been around for nearly 40 years, yet surprisingly few organizations understand what a critical security tool it can be. DNS can play many vital security roles on a network, from preventing infection by malware to neutering that malware even if it manages to...
  6. News

    security Why Domain Name System (DNS) security is critical for the healthcare industry

    The Domain Name System (DNS) has been around for nearly 40 years, yet surprisingly few organizations understand what a critical security tool it can be. DNS can play many vital security roles on a network, from preventing infection by malware to neutering that malware even if it manages to...
  7. News

    news Domain Shadowing is on the Rise

    A shadow domain is usually a subdomain surreptitiously added on to a typically reputable domain that will portray something that might look legitimate when it is not. So, for example, if you were to go to something like "yourbank[.]com" and asked to log in to your account, you might think...
  8. News

    news Domain Shadowing is on the Rise

    A shadow domain is usually a subdomain surreptitiously added on to a typically reputable domain that will portray something that might look legitimate when it is not. So, for example, if you were to go to something like "yourbank[.]com" and asked to log in to your account, you might think...
  9. News

    security Hundreds of eCommerce Domains Infected With Google Tag Manager-Based Skimmers

    All of the 569 ecommerce platforms infected with skimmers were associated in one way or the other with GTM abuse. While 314 have been infected with a GTM-based skimmer, data from the remaining 255 has been exfiltrated to domains associated with GTM container abuse. As of August 2022, there were...
  10. News

    security Hundreds of eCommerce Domains Infected With Google Tag Manager-Based Skimmers

    All of the 569 ecommerce platforms infected with skimmers were associated in one way or the other with GTM abuse. While 314 have been infected with a GTM-based skimmer, data from the remaining 255 has been exfiltrated to domains associated with GTM container abuse. As of August 2022, there were...
  11. Future Sensors

    security These are the top-level domains threat actors like the most

    These are the top-level domains threat actors like the most November 12, 2021 Out of over a thousand top-level domain choices, cyber-criminals and threat actors prefer a small set of 25, which accounts for 90% of all malicious sites. Six out of the top 10 of these 25 top-level domains (TLD)...
  12. Future Sensors

    security These are the top-level domains threat actors like the most

    These are the top-level domains threat actors like the most November 12, 2021 Out of over a thousand top-level domain choices, cyber-criminals and threat actors prefer a small set of 25, which accounts for 90% of all malicious sites. Six out of the top 10 of these 25 top-level domains (TLD)...
  13. Future Sensors

    security What are Indicators of Compromise (IOCs)?

    What are Indicators of Compromise (IOCs)? Indicators of compromise (IOCs) are pieces of forensic data, such as system log entries, system files or network traffic that identify potentially malicious activity on a system or network. Digital forensics security analysts and information security...
  14. Future Sensors

    security What are Indicators of Compromise (IOCs)?

    What are Indicators of Compromise (IOCs)? Indicators of compromise (IOCs) are pieces of forensic data, such as system log entries, system files or network traffic that identify potentially malicious activity on a system or network. Digital forensics security analysts and information security...
  15. Lox

    domains Namecheap refines strategy to fight malicious domains

    Domain registrar Namecheap, Inc. is being commended for its improved reporting and remediation strategy for malicious domains, though it is unclear what spurred the changes for the company. Security researchers took to Twitter recently, citing a significant improvement in response time by...
  16. Lox

    domains Namecheap refines strategy to fight malicious domains

    Domain registrar Namecheap, Inc. is being commended for its improved reporting and remediation strategy for malicious domains, though it is unclear what spurred the changes for the company. Security researchers took to Twitter recently, citing a significant improvement in response time by...
  17. Lox

    domains Shadowserver Needs Your Help

    Anyone who’s seen the 1984 hit movie Ghostbusters likely recalls the pivotal scene where a government bureaucrat orders the shutdown of the ghost containment unit, effectively unleashing a pent-up phantom menace on New York City. Now, something similar is in danger of happening in cyberspace...
  18. Lox

    domains Shadowserver Needs Your Help

    Anyone who’s seen the 1984 hit movie Ghostbusters likely recalls the pivotal scene where a government bureaucrat orders the shutdown of the ghost containment unit, effectively unleashing a pent-up phantom menace on New York City. Now, something similar is in danger of happening in cyberspace...
  19. Lox

    domains Microsoft has disrupted the Necurs botnet and 6 million domains

    Microsoft and partners across 35 countries took coordinated legal and technical steps to disrupt one of the world’s most prolific botnets, called Necurs, which has infected more than nine million computers globally. This disruption is the result of eight years of tracking and planning and will...
  20. Lox

    domains Microsoft has disrupted the Necurs botnet and 6 million domains

    Microsoft and partners across 35 countries took coordinated legal and technical steps to disrupt one of the world’s most prolific botnets, called Necurs, which has infected more than nine million computers globally. This disruption is the result of eight years of tracking and planning and will...
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back