Whois History: How to Check the Domain Owner History
Last week, we published an interesting topic about newly registered domain names, and how monitoring these could help the infosec industry investigate malicious incidents such as malware, viruses and phishing campaigns.
Newly registered domain feeds
In the current digital era, information is power, and the Internet is run by two main things: domain names and IP addresses. Without both, there would be is no way to reach online services.
Domain Security & Solutions, Part 4: How to Protect your Account at your Registrar
Not all entrepreneurs and developers are truly aware of the implications of losing a domain name. That’s why keeping it secure has to be one of your top priorities when running a company or business with an online presence.
Domain Security & Solutions, Part 3: Stale DNS Records & Subdomain Takeover Attacks
Since the beginning, the Internet has been powered by servers. Going back a few decades, most companies used bare metal servers. Then came VPS servers, which allowed people to run virtual operating systems in a single dedicated server with different applications, database technologies, and more.
Domain Security & Solutions, Part 2: Phishing & Trademark Infringement Attacks
Millions of emails are sent every day, and a few of them will surely hit your inbox. Apart from your personal, notification and corporate emails, you’ll undoubtedly be asked to open emails from “companies” inviting you to update your account’s personal details with a certain bank, or with other popular online services such as Google, Apple or Dropbox.
Domain Security & Solutions – Part 01: Cybersquatting & Copyright Infringement
When we think about cyber attacks and general network threats, we usually imagine massive flood attacks, SQL injections and web application vulnerabilities.
Domain Profiler: How to build a full domain infrastructure overview
Information is power, and here on the Internet that’s one of the biggest truths no one can deny. When you have the right information at the right time, and you know how to use it, your success is practically guaranteed.
Whois Lookup: Definition and Examples
It encompasses millions of users on the Internet. And it doesn’t matter if you’re a web designer, the owner of a car company, a photographer, a fast food restaurant manager, or any kind of business owner — you’re part of it even if you don’t know it.
Domain Tools: top DNS, IP and Domain utilities to investigate any website
Domain names are one of the top things you will check when it comes to a cybersecurity investigation. They are the key to open a treasure trove that, when analyzed correctly, may reveal deep secrets about the company, individuals, servers, IPs, network technology and DNS zones behind the TLD.
Domain Theft: How to Avoid Buying Stolen Domain Names and Protect Your Own Domains
Previously we shared some interesting tips about domain hijacking, where we discussed a few concepts, information and tips to prevent this kind of malicious activity against your domain names. Domain stealing, also known as domain theft, is a common criminal activity on the Internet. It consists in transferring your domain name illegally to another registrar, without you knowing about it.