Domain Empire

cybersecurity

Spaceship Spaceship
  1. Lox

    domains Crypto scams: fake domains grows five-fold in H1 2022

    According to Group-IB, 63% of the new fraudulent domain names were registered with Russian registrars, but the fake websites are primarily designed to target English and Spanish-speaking crypto investors in the US and other countries. The researchers also compiled a list of the most popular...
  2. Lox

    domains Crypto scams: fake domains grows five-fold in H1 2022

    According to Group-IB, 63% of the new fraudulent domain names were registered with Russian registrars, but the fake websites are primarily designed to target English and Spanish-speaking crypto investors in the US and other countries. The researchers also compiled a list of the most popular...
  3. equity78

    domains CyberSecurityJobs.com becomes the largest Keyword-Jobs reported sale of all time $205K

    CyberSecurityJobs.com becomes the largest Keyword-Jobs reported sale of all time Cyber Security is an important and highly competitive industry. The need for professionals in this field grows monthly. CyberSecurityJobs.com sold for $205,000 today at Sedo. The domain now forwards to the .net...
  4. equity78

    domains CyberSecurityJobs.com becomes the largest Keyword-Jobs reported sale of all time $205K

    CyberSecurityJobs.com becomes the largest Keyword-Jobs reported sale of all time Cyber Security is an important and highly competitive industry. The need for professionals in this field grows monthly. CyberSecurityJobs.com sold for $205,000 today at Sedo. The domain now forwards to the .net...
  5. Lox

    domains There are more malicious domains online than ever before

    Thousands of new domains are registered everyday so that businesses and individuals can build websites but new research from Palo Alto Networks has revealed that cybercriminals often register malicious domains years before they intend to actually use them. The cybersecurity firm's Unit 42 first...
  6. Lox

    domains There are more malicious domains online than ever before

    Thousands of new domains are registered everyday so that businesses and individuals can build websites but new research from Palo Alto Networks has revealed that cybercriminals often register malicious domains years before they intend to actually use them. The cybersecurity firm's Unit 42 first...
  7. Lox

    domains Bots Use Domain Registration Services for Mass Account Fraud

    Jason Kent, hacker-in-residence at Cequence Security, discusses sneaky shopping bot tactics (i.e., domain parking) seen in a mass campaign, and what retail security teams can do about them. While researching a recent large-scale bot campaign with CQ Prime Threat Research team lead, Dean...
  8. Lox

    domains Bots Use Domain Registration Services for Mass Account Fraud

    Jason Kent, hacker-in-residence at Cequence Security, discusses sneaky shopping bot tactics (i.e., domain parking) seen in a mass campaign, and what retail security teams can do about them. While researching a recent large-scale bot campaign with CQ Prime Threat Research team lead, Dean...
  9. Lox

    domains ICANN-accredited registrar Provides Bulletproof Services to Cyberattackers

    Bulletproof hosting (BPH) is a collection of service offerings catering to internet-based criminal activity. Shinjiru is another example frequently appearing in threat infrastructure. The Malaysian hosting company shields its customers and their web content and servers from takedown requests...
  10. Lox

    domains ICANN-accredited registrar Provides Bulletproof Services to Cyberattackers

    Bulletproof hosting (BPH) is a collection of service offerings catering to internet-based criminal activity. Shinjiru is another example frequently appearing in threat infrastructure. The Malaysian hosting company shields its customers and their web content and servers from takedown requests...
  11. Future Sensors

    security Top 12 Cybersecurity Regulations in the Financial industry

    Top 12 Cybersecurity Regulations in the Financial industry The proliferation of cyberattacks targeting the financial sector has forced the establishment of several mandatory cybersecurity regulations. Though often considered an unnecessary burden on security teams, regulatory compliance is one...
  12. Future Sensors

    security Top 12 Cybersecurity Regulations in the Financial industry

    Top 12 Cybersecurity Regulations in the Financial industry The proliferation of cyberattacks targeting the financial sector has forced the establishment of several mandatory cybersecurity regulations. Though often considered an unnecessary burden on security teams, regulatory compliance is one...
  13. Future Sensors

    security Phishing attacks: defending your organisation (NCSC UK)

    Phishing attacks: defending your organisation (NCSC UK) "Phishing attacks: defending your organisation" provides a multi-layered set of mitigations to improve your organisation's resilience against phishing attacks, whilst minimising disruption to user productivity. The defences suggested in...
  14. Future Sensors

    security Phishing attacks: defending your organisation (NCSC UK)

    Phishing attacks: defending your organisation (NCSC UK) "Phishing attacks: defending your organisation" provides a multi-layered set of mitigations to improve your organisation's resilience against phishing attacks, whilst minimising disruption to user productivity. The defences suggested in...
  15. Future Sensors

    security Warner says cyber threats more worrying than 'traditional weaponry'

    Warner says cyber threats more worrying than 'traditional weaponry' Sen. Mark Warner (D-Va.), said Thursday that cyberattacks pose larger risks than conventional warfare, citing the recent SolarWinds and Colonial Pipeline hacks as examples of a “dramatically” different security environment that...
  16. Future Sensors

    security Warner says cyber threats more worrying than 'traditional weaponry'

    Warner says cyber threats more worrying than 'traditional weaponry' Sen. Mark Warner (D-Va.), said Thursday that cyberattacks pose larger risks than conventional warfare, citing the recent SolarWinds and Colonial Pipeline hacks as examples of a “dramatically” different security environment that...
  17. Future Sensors

    security 6 Most Common Causes of Data Leaks in 2021

    6 Most Common Causes of Data Leaks in 2021 The trend of global data breach events is steep and still continuing to tilt upwards. According to the latest data breach investigation report by IBM and the Ponemon Institute, data breach costs in 2021 have reached a record high. Last year, the...
  18. Future Sensors

    security 6 Most Common Causes of Data Leaks in 2021

    6 Most Common Causes of Data Leaks in 2021 The trend of global data breach events is steep and still continuing to tilt upwards. According to the latest data breach investigation report by IBM and the Ponemon Institute, data breach costs in 2021 have reached a record high. Last year, the...
  19. Future Sensors

    security Why a Strong Security Culture?

    Why a Strong Security Culture? What is the value of security culture to an organization’s mission? People often discuss the importance of a strong security culture but fail to define what they mean by security culture, and even more importantly, why is it so important, what is the value...
  20. Future Sensors

    security Why a Strong Security Culture?

    Why a Strong Security Culture? What is the value of security culture to an organization’s mission? People often discuss the importance of a strong security culture but fail to define what they mean by security culture, and even more importantly, why is it so important, what is the value...
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back