NameBee is your source for Blog Aggregation in the Domain Name industry
Son of a Phish Coming up this week on Breaking Badness. Today we discuss a Major SPOILER Alert, an 0Day Exploit (aka CVE-2019-5786), and a Floundering, Flailing, Phishing Attack. Developing...
Every year on March 8th (for over a century), organizations from around the world come together to celebrate International Women's Day. It's a day to celebrate the accomplishments of our...
You Down With APT, Yeah You Know Me Coming up this week on Breaking Badness. Today, we discuss: Sleep Deprivation Isnt the Only Thing attacking Your (Machines) Memory (PowerShell +...
Fancy Bear Awakens From Its Winter Slumber Coming up this week on Breaking Badness. Today we discuss the DNSpionage, Fancy Bear (APT28) is Back at it Again, and WinRAR Hasnt...
As all of you are well aware, RSA (which is arguably the largest information security conference) is just around the corner. This event is a great opportunity to connect with...
Part III: Intelligence Resources Welcome back to our blog series on security investigations in a post-GDPR world. In the past two posts Security Researcher, Emily Hacker, focused on conducting investigations...
African or European EXEs Coming up this week on Breaking Badness. Today we discuss the a malware-ridden mail attachment from a Super Mario Image, DNS Manipulation in Venezuela, and Malware...
Part II: Non-Registrant Based Connections Welcome back to my blog series on conducting security investigations in a post-GDPR world. Last week I covered DomainTools Risk Score, and this week Im...
More Than a Weekend Update One thing I have always appreciated when it comes to the infosecurity community, is that it's built on the fundamental principle that in order to...
Part I – Conducting Investigations In May 2018, the General Data Protection Regulation (GDPR) went into effect and subsequently altered the way that cybersecurity analysts are able to perform their...
The 2019 SANS CTI Survey Reveals the Evolution of Threat Intelligence Best Practices Once an industry buzzword, Cyber Threat Intelligence (CTI) is now a critical resource for enterprise security. With...
DomainTools for Maltego Leveraged by our colleagues for digital intelligence gathering through data mining and correlation, DomainTools for Maltego is helping customers map attacker infrastructure with domains and IPs. One...
Cybersecurity Articles from January 19-25 With cybersecurity threats looming, the government shutdown is putting America at risk TechCrunch | Monica Pal | January 24, 2019 Putting political divisions and affiliations...
I'm happy to announce that we've open-sourced our SSL certificate parser! This Python package is used in our production systems to robustly parse TLS certificates that we find on the...
Cybersecurity Articles from January 12-18 Hack Brief: An astonishing 773 million records exposed in monster breach WIRED | Brian Barrett | January 16, 2019 There are breaches, and there are...
By now you are likely pretty familiar with our quarterly spotlight on a DomainTools employee. Last quarter, I shared some fun information about our resident prankster, Huy Son. I feel...
Cybersecurity Articles from January 5-11 Report: Iran Is Likely Setting Stage for International Phishing Campaign Defense One | Patrick Tucker | January 10, 2019 Phishing attacks only work when the...
With 2018 in the rear view mirror for most, we wanted to look at some attainable goals for 2019 within organizations. Actionable Cybersecurity Resolutions for 2019 Dedicate 5 hours a...
Cybersecurity Articles from December 29 – January 4 Marriott Says Data Breach Not as Bad as Originally Disclosed Skift | Deanna Ting | January 4, 2018 Following the news of...
In an era of tighter privacy laws, it's important to create an online environment that uses threat intelligence productively to defeat disinformation campaigns and bolster democracy. When we think of...
2018 has been both a challenging and exciting year for DomainTools. We hired top talent, released product enhancements, increased the breadth of data we offer, and announced exciting integrations. It's...
I recently had the distinct pleasure of returning to the African Institute of Mathematical Sciences (AIMS) in Mbour, Senegal as a visiting lecturer. This was my second time teaching at...
Cybersecurity Articles from December 8-14 Facebook Says 6.8 Million People's Private Photos Were Exposed in New Leak Thrillist | Joe McGauley | December 14, 2018 To say that Facebook has...
Exhibiting at Black Hat Europe is quite different from doing so at Infosecurity, Europe's largest information security event. Amidst a nation of tea drinkers, InfoSec is your skinny latte –...
Cybersecurity Articles from December 1-7 The Cybersecurity 202: Russia is trying to undermine Americans confidence in the justice system, security experts warn Washington Post | Bastien Inzaurralde | December 5,...
Breach Fatigue, Cyber Cold War, IoT, and Cybersecurity Skills Gap In just the first half of this year, more than than four billion records were compromised in publicized data breaches,...
In the wake of a significant data breach like the one recently announced by Marriott, the focus of most news stories is on the potential negative impact of the data...
Cybersecurity Articles from November 24-30 Marriott reveals data breach of 500 million Starwood guests CNN | Jordan Valinksy | November 30, 2018 Marriott says its guest reservation system has been...
Cybersecurity Articles from November 17-26 Half of all Phishing Sites Now Have the Padlock Krebs On Security | Brian Krebs | November 26, 2018 Maybe you were once advised to...
Welcome to DomainTools quarterly Employee Spotlight! This is, without question one of my favorite excuses to force, I mean, invite my fellow employees at DomainTools to share more about their...
Cybersecurity Articles from November 10-16 Massive Data Leaks Keep Happening Because Big Companies Can Afford to Lose Your Data Motherboard | Erik Sherman | November 15, 2018 If you live...
New Data Reveals Online Shoppers Arent So Careful When it Comes to Sweet Deals With Thanksgiving next week, U.S. consumers and retailers are awaiting the first flurries of holiday shopping...
Cybersecurity Articles from November 3-6 U.S. Cyber Command Shares Malware Samples To Help Thwart Bad Actors Forbes | Lee Mathews | November 8, 2018 The U.S. Military plays an increasingly...
Cyber-interference with political process has reached fever pitch. The cyber-security community can help, but will legislation make it challenging for them to do so? Much has been made of the...
Cybersecurity Articles from October 27-November 2 SMS Phishing + Cardless ATM = Profit Krebs on Security | Brian Krebs | November 2, 2018 Thieves are combining SMS-based phishing attacks with...
Phishing for Treats As infosecurity professionals, we have a lot to learn from Halloween. There are many important trick-or-treating strategies used on this particular holiday, whether it be to find...
Cybersecurity Articles from October 20-26 Cathay Pacific Data Breach Exposes 9.4 Million Passengers New York Times | Raymond Zhong | October 25, 2018 Cathay Pacific, the Hong Kong-based international airline,...
Recently, there have been more publicized attacks to what we consider our critical infrastructure. Which, according to the Patriot Act of 2001, the United States defines critical infrastructure as those...
Cybersecurity Articles from October 13-19 3 Years After Attacks on Ukraine Power Grid, BlackEnergy Successor Poses Growing Threat Dark Reading | Jai Vijayan | October 17, 2018 Three years after...
National Cyber Security Awareness Month Week 3 Let me start off by saying that I have a deep passion for cybersecurity and truly believe that there are folks out...
DerbyCon Reflections 2018 DerbyCon was my first Infosec conference, and I wasnt really sure what to expect. I read that its a conference for hackers, run by hackers. I had...
Cybersecurity Articles from October 6-12 More than half of working adults don't know what ransomware is Techradar | Anthony Spadafora | October 10, 2018 New research has revealed that 64...
National Cyber Security Awareness Month – Week 2 In 2014, I joined an Application Security vendor, and this would be what our team still refers to as The Glory Days....
Cybersecurity Articles from September 29 – October 5 Fortnite cheaters are being targeted with malware Fast Company | Steven Melendez | October 4, 2018 Fortnite players looking for ways to...
Happy Cyber Security Awareness Month (NSCAM) As the Fall season rolls around we all think about pumpkin bread and pumpkin spiced lattes…oh wait that might just be me. Most people...
If youre an infosec practitioner, you have undoubtedly used many tools that have a dark theme, whether by default or as a configurable option. Most command line interfaces have light...
Cybersecurity Articles from September 22-28 Facebook: 50 million accounts ‘directly affected' by hack Mashable | Jack Morse | September 28, 2018 A million hacked Facebook accounts isnt cool. You know...
We have been busy bees this summer at DomainTools. We launched an exciting new product, our Iris Investigate and Enrich APIs, released our annual Cybersecurity Report Card survey report, and...
Cybersecurity Articles from September 15-21 Google Warned Senators, Aides Of Hacking Attempts On Personal Emails NPR | Alina Selyukh | September 20, 2018 Google has warned some senators and Senate...
What do I Mean by Web Assets? In general, when I refer to web assets, I mean files that are loaded into the main HTML of a site via HTML...
- Welcome!
- NameBee aggregates blogs for the Domain Name industry.
- Custom Feeds
- Add any RSS feed to the information you read daily.
- Blocked Feeds
- Block feeds to remove blogs you’re not interested in.
- Account Settings
- Customize the site by adding or removing feeds.
Don’t have an account yet?
- Customize your settings
- Edit how your blog displays
- Add or remove blogs you read. Sign Up.
About Us
NameBee is your source for all your Domain Name news.
Have a Suggestion for Us?
|
Know of a Domain Name blog that we're missing? Let us know!
|