Tag: CircleID: Cyberattack

It’s Time to Rethink Outage Reports

This article has been indexed from CircleID: Cyberattack Much has been said about the criticality of the small coterie of large-scale content distribution platforms and their critical role in today’s Internet. These days when one of the small set of…

WhoisXML API Upgraded Its Web Categorization Engine

This article has been indexed from CircleID: Cyberattack Web categorization engines and related tools are built to help organizations classify websites they do business or generally interact with. WhoisXML API’s Website Categorization API and Website Categorization Lookup used to classify…

The Importance of Understanding Attacker Target Selection

This article has been indexed from CircleID: Cyberattack There’s a bit of a debate going on about whether the Kaseya attack exploited a 0-day vulnerability. While that’s an interesting question when discussing, say, patch management strategies, I think it’s less…

Notes from NANOG 81

Read the original article: Notes from NANOG 81 As the pandemic continues, the network operator community continues to meet online. NANOG held its 81st meeting on February 8 and 9, and these are my notes from some of the presentations…

How to Monitor IP Netblocks for Possible Targeted Attacks

Read the original article: How to Monitor IP Netblocks for Possible Targeted Attacks A couple of weeks back, a security researcher alerted his LinkedIn contacts about possibly ongoing targeted attacks stemming from the Iranian subnet 194[.]147[.]140[.]x. He advised cybersecurity specialists…

Protecting an Enterprise from Cyber Catastrophe

Read the original article: Protecting an Enterprise from Cyber Catastrophe We are suffering an epidemic of cyberattacks while in a viral pandemic. This post is for those who have responsibility for assuring that the IT-based services offered by their enterprise…

Attack Surface Analysis of 3 Social Media Giants

Read the original article: Attack Surface Analysis of 3 Social Media Giants Cybercrime is first and foremost financially motivated. Cybercriminals look for lucrative targets, including social media networks with hundreds of millions of monthly active users. We put this perspective…

Attack Surface Monitoring: Two Ways to Detect Phishing Subdomains

Read the original article: Attack Surface Monitoring: Two Ways to Detect Phishing Subdomains Phishing attacks’ success can be partially attributed to threat actors’ use of branded domain names, including both legitimate and misspelled variants. It’s no wonder, therefore, that blacklisting…

The DNS Ecosystem, Its Vulnerabilities, and Threat Mitigations

Read the original article: The DNS Ecosystem, Its Vulnerabilities, and Threat Mitigations David Conrad, CTO of The Internet Corporation for Assigned Names and Numbers (ICANN), recently presented a keynote during a webinar we collaborated on with other internet organizations. Below…

How IP Geolocation Lookups Help Thwart Cyber Attacks

Cyber attacks can hit any organization and even derail its operation on a grand scale. Just recently, ISS World, a facility management service provider with clients in more than 70 countries worldwide, released a statement where it mentions being the…