Eliminating the Threat of Look-alike Domains

Read the original article: Eliminating the Threat of Look-alike Domains


There are many ways look-alike domains can be used by threat actors. While business email compromise (BEC) and phishing sites are often top-of-mind for defenders, there are dozens of other uses for look-alike domains. This variation, as well as diverse registrar requirements for removal, can make mitigating look-alike domains a complex, burdensome, and often ineffective process.
 
In this post, we examine steps to mitigate the internal and external risk posed by look-alike domains. 


Read the original article: Eliminating the Threat of Look-alike Domains