Researchers at Palo Alto Networks took a deep dive into the TLDs commonly used by threat actors and why they are being chosen. The categories picked for analysis are malware, phishing, command and control (C2), and grayware: adware, “joke malware,” spyware...Read More