Search Results for: domain Blog Post How expired web domains help criminal hackers unlock enterprise defenses January 19, 2022 Managing a company’s security can feel like trying to keep an old, leaky boat afloat. As soon as you find... Blog Post Perl.com Hijack: It Is No More A Safe Domain February 24, 2021 On January 27, 2021, the Perl Foundation announced that someone hijacked Perl.com, a famous Perl Programming Language website that started... Blog Post 50 Domains Operated by North Korean Hackers Are Taken Down January 7, 2020 On December 30th, Microsoft announced that 50 web domains operated by a hacking group fund by the North Korean government... Blog Post Persistent Linux Security Problem Enables DNS Cache Poisoning December 29, 2021 DNS cache poisoning vulnerability initially uncovered in 2008 still lives on, with the potential to cripple the internet as we... Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... Blog Post Scams and Fake Domains Attack May Ruin Your Black Friday and Cyber Monday November 28, 2019 As Black Friday and Cyber Monday attract a lot of shoppers, cybercriminals use more sophisticated measures such as scams and... Blog Post CISA’s Patch by Tonight Emergency Directive October 6, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) has published an Patch by Tonight emergency directive. It requires federal agencies to... Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a... Blog Post FBI Seizes 15 Domains Selling DDoS Services January 1, 2019 The FBI took down fifteen domains selling DDoS-as-a-service and charged three men for running the illegal services in one of... Blog Post PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows... Blog Post What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Knowledge Center Mitigating Credential Dumping on Windows Clients July 9, 2021 Credential dumping from compromised Windows clients allows the attacker to perform lateral movement and gain control even after more sensitive hosts... Blog Post How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has... Blog Post DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a... Blog Post PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services...
Blog Post How expired web domains help criminal hackers unlock enterprise defenses January 19, 2022 Managing a company’s security can feel like trying to keep an old, leaky boat afloat. As soon as you find...
Blog Post Perl.com Hijack: It Is No More A Safe Domain February 24, 2021 On January 27, 2021, the Perl Foundation announced that someone hijacked Perl.com, a famous Perl Programming Language website that started...
Blog Post 50 Domains Operated by North Korean Hackers Are Taken Down January 7, 2020 On December 30th, Microsoft announced that 50 web domains operated by a hacking group fund by the North Korean government...
Blog Post Persistent Linux Security Problem Enables DNS Cache Poisoning December 29, 2021 DNS cache poisoning vulnerability initially uncovered in 2008 still lives on, with the potential to cripple the internet as we...
Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
Blog Post Scams and Fake Domains Attack May Ruin Your Black Friday and Cyber Monday November 28, 2019 As Black Friday and Cyber Monday attract a lot of shoppers, cybercriminals use more sophisticated measures such as scams and...
Blog Post CISA’s Patch by Tonight Emergency Directive October 6, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) has published an Patch by Tonight emergency directive. It requires federal agencies to...
Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a...
Blog Post FBI Seizes 15 Domains Selling DDoS Services January 1, 2019 The FBI took down fifteen domains selling DDoS-as-a-service and charged three men for running the illegal services in one of...
Blog Post PrintNightmare: A Critical Windows Print Spooler Vulnerability July 6, 2021 On June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows...
Blog Post What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
Knowledge Center Mitigating Credential Dumping on Windows Clients July 9, 2021 Credential dumping from compromised Windows clients allows the attacker to perform lateral movement and gain control even after more sensitive hosts...
Blog Post How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has...
Blog Post DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a...
Blog Post PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services...