Using Social Media OSINT to Determine Actor Locations
Read More
Activists Leak Data Stolen in Ransomware Attacks
Look-alike Domain Mitigation: Breaking Down the Steps
Year In Review: Ransomware
Topics: Ransomware
The Anatomy of a Look-alike Domain Attack
Cybercriminals register hundreds of thousands of look-alike domains every year to impersonate reputable organizations and make a profit. These domains are used for a variety of attacks including phishing emails, fraudulent websites, web traffic diversion, and malware delivery.
Topics: Spear Phishing Protection, business email compromise, Digital Risk Protection, Domains
The Year In Review: How COVID-19 Has Changed Cyber Security
Topics: COVID-19
APWG Q3 Report: Four Out of Five Criminals Prefer HTTPS
Topics: Phishing, BEC, business email compromise, https, Domains
Easy to Deceive, Difficult to Detect, Impersonation Dominates Attacks
Topics: Digital Risk Protection, DRP, Domains, Brand Abuse
What is a Look-alike Domain?
By definition, a look-alike domain is a nearly identical, slightly altered domain name, registered with intent to deceive. Cybercriminals register hundreds of thousands of look-alike domains each year with the goal of impersonating legitimate businesses and making money, usually by committing fraud.
In this post, we’ll describe how domains help us communicate on the Internet, the anatomy of a look-alike domain and why we fall for them, how attackers create them, and the best place to begin when facing this common threat.
Topics: Digital Risk Protection, Domains
Top 7 Use Cases for Digital Risk Protection
Today’s enterprises are experiencing an accelerated digital transformation due to the pandemic, and adoption of initiatives that would normally span years are being fast-tracked to support remote workforces and transition to new platforms. The external digital landscape is also rapidly expanding, and organizations are being required to conduct business more frequently through non-traditional channels. This digital evolution is leaving enterprises increasingly susceptible to attacks outside the network perimeter.
In order to detect and respond to today's most relevant threats, security teams are investing in operational Digital Risk Protection (DRP) capabilities.Topics: Digital Risk Protection, DRP