How Fraudulent Domains 'Hide in Plain Sight'

How Fraudulent Domains ‘Hide in Plain Sight’

Cybercriminals use new types of top-level domains, topical keywords, and targeted emails to trick victims into clicking malicious links. Domain fraud is an old cybersecurity…

View More How Fraudulent Domains ‘Hide in Plain Sight’
DNS Firewalls Could Save Companies Billions

DNS Firewalls Could Save Companies Billions

New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year. DNS protection could prevent approximately one-third of…

View More DNS Firewalls Could Save Companies Billions
Dell laptops and computers vulnerable to remote hijacks

Dell laptops and computers vulnerable to remote hijacks

A vulnerability in the Dell SupportAssist utility exposes Dell laptops and personal computers to a remote attack that can allow hackers to execute code with admin privileges…

View More Dell laptops and computers vulnerable to remote hijacks
Nation-State Hacker Group Hijacking DNS to Redirect Email, Web Traffic

Nation-State Hacker Group Hijacking DNS to Redirect Email, Web Traffic

‘Sea Turtle’ group has compromised at least 40 national security organizations in 13 countries so far, Cisco Talos says. A sophisticated state-sponsored hacking group is…

View More Nation-State Hacker Group Hijacking DNS to Redirect Email, Web Traffic
Attackers Target Home Routers with DNS Hijacking

Attackers Target Home Routers with DNS Hijacking

Hackers have been breaking into home routers to change DNS server settings and hijack the traffic to redirect it to malicious sites, according to Troy Mursch,…

View More Attackers Target Home Routers with DNS Hijacking
What are DMARC, SPF and DKIM? How to master email security with these protocols

What are DMARC, SPF and DKIM? How to master email security with these protocols

Despite making some progress, a trio of email security protocols has seen a rocky road of deployment in the past year. Going by their acronyms…

View More What are DMARC, SPF and DKIM? How to master email security with these protocols