NameBee is your source for Blog Aggregation in the Domain Name industry
DomainTools and Askari Blue have teamed up to provide a playbook that encapsulates the workshop lesson Hunting for RATs and guides the reader through a series of toolsets and analytical processing.
Catching cyber culprits will always be a cat and mouse game, read this blog to learn 10 tips for web asset fingerprinting, and stay a step ahead of attackers.
Thanks to the specific fingerprints of the ISMDoor malware we can keep an eye on current activity and reference past activity through Iris by looking for AAAA records that return those expected results containing the static IPv6 response fingerprints
Human capital remains the most constrained resource within security teams in the midst of growing cyber warfare. Adding to this issue is the constant challenge of reconciling internal assets and event data with known Indicators of Compromise (IOC) an
There has been a lot of big changes to the Warzone commercial and non-commercial infrastructure since my previous write up.
Last year, Japanese authorities reported a sophisticated and aggressive phishing campaign using websites spoofing Sagawa Express Co., a major shipping and logistics company in Asia.
Today, were thrilled to announce the latest DomainTools app for Splunk - 3.4. With these enhancements, our customers can leverage the DomainTools Iris Enrich API and PhishEye API for rapid enrichment of domains with Iris tags, Domain Risk Score, dom
You may be sitting at work early in the morning, enjoying your coffee and the peace and quiet that comes along with being the first one in the office. Like most, the first thing you do is check some emails (not all of it, just some, because theres
While summer brings to mind hot beaches and cold beverages, we spent a lot of the last couple of months working on a set of new features for our Iris users, and they are now available to you to try out!
The cybercrime space has been evolving into a profitable area for several years. Malware authors now commonly sell malware as a service, dramatically reducing the technical barrier-to-entry for criminals to have those capabilities. One of the more
This will be another of a hopefully long series of practical OSINT blog posts from the Security Research team here at DomainTools. This time around Ill be briefly comparing the reverse image search capabilities of some major image search engines. We
The other day in the course of my usual hunting, I came across a network of seemingly run-of-the-mill websites designed to spoof banks, financial organizations, oil and gas companies, and...
Defcon 27 had no shortage of amazing talks, workshops, villages, and events to engage with and learn from, but there was one in particular that really resonated with me: the...
For network defenders, false positives are a common challenge and frequently result in alert fatigue. A consequence of alert fatigue, according to a study conducted by the Cloud Security Alliance,...
15 days ago, our phishing detection solution PhishEye picked up multiple domains spoofing the term Walmart. The one that caught my eye was walmartcareers[.]us. When I decided to export the...
Its that time of yearSummer Camp 2019 is just around the corner! Over the years, a mix of DomainTools security professionals, data scientists, engineers, and marketers have participated in Summer...
Introducing The New Security Moat Coming up this week on Breaking Badness. Today we discuss: Deputy Dog, Not Reporting for Duty, Unleash the Cybers! NSA Forms Cybersecurity Directorate, and The...
Not Just Phishing for the Halibut Coming up this week on Breaking Badness. Today we discuss: More Doom and Zoom for the Video Conferencing Industry, Holy Mackerel Amazon Accounts No...
The Regin of Doom Coming up this week on Breaking Badness. Today we discuss: How is Russia Putin up with This, Where There is a Wheel, There is a Way,...
We have been staying very busy here the past three months at DomainTools! For starters, we released research conducted by the Ponemon Institute on Staffing the IT Security Function in...
The Machine Kernel of Truth Coming up this week on Breaking Badness. Today we discuss: A brief PSA.Netflix Autoplays Hacky SACK with Linux and FreeBSD, andTurns Out OilRig and Waterbugs...
As this years travel season heats up, SPF takes on a new meaning: Summer Phishing Frenzy. Since January 2018, 566 million records have been leaked or compromised in publicly reported...
You guessed it! Its been too long since our last employee spotlight on Sales Engineer, Helen Johnson, our resident sewing enthusiast and supporter of furry friends. Next up, Im very...
A Root Awakening Coming up this week on Breaking Badness. Today we discuss: No One Makes Bleed My Own RAM, Exim Marks the Spot for Vulnerabilities, and Not So Ok...
How to Drain Your Dragons Coming up this week on Breaking Badness. Today we discuss: XYZ Your RDP, Shut the Backdoor! , and Opening the Komodo on Cryptocurrency. Here are...
Two Truths and a Lie Coming up this week on Breaking Badness. Today we discuss: License and Exfiltration, Please, I Smell A RAT, and A Bleak Outlook on an Office...
Today, we are pleased to announce the latest of a set of enhancements to DomainTools Iris: Domain Tagging . But before we go into detail about Tagging, lets set the...
DomainTools identifies malicious campaigns targeting HMRC and other organizations with the intent of capturing PII When people in the UK think of phishing scams, theres a fair chance that the...
Note: The source code for this analysis can be found in the DomainTools GitHub repo here. In the beginning there were six top level domains (TLDs). Ok, technically seven, but...
A few months back, in early 2019, I found myself on a customer call with a SOC manager who begrudgingly admitted how much his team had come to value the...
RIP Grumpy Cat Coming up this week on Breaking Badness. Today we discuss: A Vulnerability Called Thangrycat? You Gotta be Kitten Me!, WHASAPPPPPP, and ‘GozNym' Discovers How Accrual the World...
Hack Days were upon us and what was a quality assurance tester to work on? What would bring value to the company, make my job simpler, and be a fun...
The Hurt Locker Coming up this week on Breaking Badness. Today we discuss: How Fin7 Leverages (enabled) Macro Economics, Holy Mackerel, Hidden Cobra is at it Again, and The...
People say that once somethings on the internet, its there forever. And while that seems to be unfortunately true for Facebook posts and embarrassing photos, it isnt always the case...
The Weekly Shatter Coming up this week on Breaking Badness. Today we discuss:What the Dell?!,A Threat Actor Goes on a Power Trip, and Cartoon Network Dances On Air. Here are...
Oftentimes in security, the practice of threat hunting is aspirational, as organizations consistently find themselves bogged down with alerts and forced to act on threats retroactively. That being said, more...
Threat hunting as a discipline is a relatively new practice area. It evolved from a combination of SecOps and forensic investigation activities. Now, when an incident occurs, professionals engage in...
Enjoy a guest blog written by Paul Asadoorian detailing Paul's Security Weekly Episode #598 Malicious or Not? The above question runs through the brains of SOC analysts across the world...
Turtle-y Awesome Coming up this week on Breaking Badness. Today we discuss:A Turtle-y Radical DNS Hijacking Attack, He Licks What? Hacker Group Exposes Iranian APT Operations and Members, and When...
One of the most exciting developments in the cybersecurity product space right now is elevation of orchestration software from a niche tool to an essential capability. Vendors and analysts have...
Who am I? That's one secret I'll never tell! Coming up this week on Breaking Badness. Today we discuss, XOXO: Stuxnet, Pinging Down the House, andThe Matrix: Un-Loaded. Here are...
By Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute Todays IT security teams are understaffed and as a result, overworked. According to the findings of Staffing the IT Security Function...
Feeling Lucky88755 Coming up this week on Breaking Badness. Today we discuss, How to Cut Out the Middleman, A Hardcore Apple Phishing Campaign: Roaming Mantis, Time Well Serpent. Here are...
A new industry buzzword in the infosecurity space is the concept of threat hunting. A now widely-accepted discipline (77% have a moderate or high degree of understanding about threat hunting)...
Too Big For Our Breaches Coming up this week on Breaking Badness. Today we discussYou Got Served…The Sequel, Cat Got Your Websites and, How the Center for Advanced Defense is...
* (all names have been REDACTED for the safety of those involved) In 2016, I had the pleasure of writing a blog post appropriately named PranksGiving. In this blog, I...
This quarter has been a busy one for DomainTools! Were honored to report our Iris Investigation Platform won three Cyber Security Excellence Awards including Best Cyber Threat Intelligence Platform, Threat...
Fending Off Canadian Tuxedos Coming up this week on Breaking Badness. Today we discuss how an Aluminum Giant Was Foiled by LockerGoga Ransomware, Shocking Heart Defibrillator Vulnerabilities and, Introducing...
The Ides of Arch Coming up this week on Breaking Badness. Today we discuss A (Key) Stroke of Genius, Gaming the System with the Belonard Trojan and, What the Pacman...
My mother operated a daycare and preschool out of our home when I was growing up. Everyone loved her, kids and parents alike, and things went along just fine, until...
- Welcome!
- NameBee aggregates blogs for the Domain Name industry.
- Custom Feeds
- Add any RSS feed to the information you read daily.
- Blocked Feeds
- Block feeds to remove blogs you’re not interested in.
- Account Settings
- Customize the site by adding or removing feeds.
Don’t have an account yet?
- Customize your settings
- Edit how your blog displays
- Add or remove blogs you read. Sign Up.
About Us
NameBee is your source for all your Domain Name news.
Have a Suggestion for Us?
|
Know of a Domain Name blog that we're missing? Let us know!
|