Dan.com

cybersecurity

NameSilo
  1. Lox

    domains There are more malicious domains online than ever before

    Thousands of new domains are registered everyday so that businesses and individuals can build websites but new research from Palo Alto Networks has revealed that cybercriminals often register malicious domains years before they intend to actually use them. The cybersecurity firm's Unit 42 first...
  2. Lox

    domains There are more malicious domains online than ever before

    Thousands of new domains are registered everyday so that businesses and individuals can build websites but new research from Palo Alto Networks has revealed that cybercriminals often register malicious domains years before they intend to actually use them. The cybersecurity firm's Unit 42 first...
  3. Lox

    domains Bots Use Domain Registration Services for Mass Account Fraud

    Jason Kent, hacker-in-residence at Cequence Security, discusses sneaky shopping bot tactics (i.e., domain parking) seen in a mass campaign, and what retail security teams can do about them. While researching a recent large-scale bot campaign with CQ Prime Threat Research team lead, Dean...
  4. Lox

    domains Bots Use Domain Registration Services for Mass Account Fraud

    Jason Kent, hacker-in-residence at Cequence Security, discusses sneaky shopping bot tactics (i.e., domain parking) seen in a mass campaign, and what retail security teams can do about them. While researching a recent large-scale bot campaign with CQ Prime Threat Research team lead, Dean...
  5. Lox

    domains ICANN-accredited registrar Provides Bulletproof Services to Cyberattackers

    Bulletproof hosting (BPH) is a collection of service offerings catering to internet-based criminal activity. Shinjiru is another example frequently appearing in threat infrastructure. The Malaysian hosting company shields its customers and their web content and servers from takedown requests...
  6. Lox

    domains ICANN-accredited registrar Provides Bulletproof Services to Cyberattackers

    Bulletproof hosting (BPH) is a collection of service offerings catering to internet-based criminal activity. Shinjiru is another example frequently appearing in threat infrastructure. The Malaysian hosting company shields its customers and their web content and servers from takedown requests...
  7. Future Sensors

    security Top 12 Cybersecurity Regulations in the Financial industry

    Top 12 Cybersecurity Regulations in the Financial industry The proliferation of cyberattacks targeting the financial sector has forced the establishment of several mandatory cybersecurity regulations. Though often considered an unnecessary burden on security teams, regulatory compliance is one...
  8. Future Sensors

    security Top 12 Cybersecurity Regulations in the Financial industry

    Top 12 Cybersecurity Regulations in the Financial industry The proliferation of cyberattacks targeting the financial sector has forced the establishment of several mandatory cybersecurity regulations. Though often considered an unnecessary burden on security teams, regulatory compliance is one...
  9. Future Sensors

    security Phishing attacks: defending your organisation (NCSC UK)

    Phishing attacks: defending your organisation (NCSC UK) "Phishing attacks: defending your organisation" provides a multi-layered set of mitigations to improve your organisation's resilience against phishing attacks, whilst minimising disruption to user productivity. The defences suggested in...
  10. Future Sensors

    security Phishing attacks: defending your organisation (NCSC UK)

    Phishing attacks: defending your organisation (NCSC UK) "Phishing attacks: defending your organisation" provides a multi-layered set of mitigations to improve your organisation's resilience against phishing attacks, whilst minimising disruption to user productivity. The defences suggested in...
  11. Future Sensors

    security Warner says cyber threats more worrying than 'traditional weaponry'

    Warner says cyber threats more worrying than 'traditional weaponry' Sen. Mark Warner (D-Va.), said Thursday that cyberattacks pose larger risks than conventional warfare, citing the recent SolarWinds and Colonial Pipeline hacks as examples of a “dramatically” different security environment that...
  12. Future Sensors

    security Warner says cyber threats more worrying than 'traditional weaponry'

    Warner says cyber threats more worrying than 'traditional weaponry' Sen. Mark Warner (D-Va.), said Thursday that cyberattacks pose larger risks than conventional warfare, citing the recent SolarWinds and Colonial Pipeline hacks as examples of a “dramatically” different security environment that...
  13. Future Sensors

    security 6 Most Common Causes of Data Leaks in 2021

    6 Most Common Causes of Data Leaks in 2021 The trend of global data breach events is steep and still continuing to tilt upwards. According to the latest data breach investigation report by IBM and the Ponemon Institute, data breach costs in 2021 have reached a record high. Last year, the...
  14. Future Sensors

    security 6 Most Common Causes of Data Leaks in 2021

    6 Most Common Causes of Data Leaks in 2021 The trend of global data breach events is steep and still continuing to tilt upwards. According to the latest data breach investigation report by IBM and the Ponemon Institute, data breach costs in 2021 have reached a record high. Last year, the...
  15. Future Sensors

    security Why a Strong Security Culture?

    Why a Strong Security Culture? What is the value of security culture to an organization’s mission? People often discuss the importance of a strong security culture but fail to define what they mean by security culture, and even more importantly, why is it so important, what is the value...
  16. Future Sensors

    security Why a Strong Security Culture?

    Why a Strong Security Culture? What is the value of security culture to an organization’s mission? People often discuss the importance of a strong security culture but fail to define what they mean by security culture, and even more importantly, why is it so important, what is the value...
  17. Lox

    security CSC Webinar Domain Security Report - Forbes Global 2000

    With cyber crime on the rise, companies in 2021 have experienced increased ransomware attacks, business email compromise (BEC), phishing attacks, supply chain attacks, and online brand and trademark abuse. Domain security is the first line of defense against these attacks, and a critical...
  18. Lox

    security CSC Webinar Domain Security Report - Forbes Global 2000

    With cyber crime on the rise, companies in 2021 have experienced increased ransomware attacks, business email compromise (BEC), phishing attacks, supply chain attacks, and online brand and trademark abuse. Domain security is the first line of defense against these attacks, and a critical...
  19. Lox

    domains EU to ban anonymous websites + verification of the DN registration data

    The EU is currently drafting legislation to increase cyber security (revised NIS Directive, in short “NIS 2”). According to this directive, the registration of internet domain names will in future require the correct identification of the owner in the Whois database, including name, address and...
  20. Lox

    domains EU to ban anonymous websites + verification of the DN registration data

    The EU is currently drafting legislation to increase cyber security (revised NIS Directive, in short “NIS 2”). According to this directive, the registration of internet domain names will in future require the correct identification of the owner in the Whois database, including name, address and...
Top Bottom