NameBee is your source for Blog Aggregation in the Domain Name industry
As any regular Iris user knows, there’s a lot of power in the various data types, tools, and actions in Iris that is not available through our classic tools. We...
Articles from March 3-9 Ransomware experiment shows the dangers of hacking robots CNNMoney | Selena Larson | March 9, 2018 Researchers at security firm IOActive have successfully conducted a ransomware...
By Joshua Crowgey and Matt Erhart Periodically, the mind of an engineer will be prone to wandering and thankfully, here at DomainTools, we have a process that corrals these thoughts...
Articles from February 24- March 2 GitHub Survived the Biggest DDoS Attack Ever Recorded WIRED | Lily Hay Newman | March 1, 2018 On Wednesday, AT about 12:15pm ET, 1.35...
By Mike Thompson *Disclaimer: Mike Thompson holds a patent on one moving target defense technology and has a patent pending on a second technology. In his previous position at Argonne...
Articles from February 17-23 Unsecured Amazon S3 buckets are prime cloud target for ransomware attacks TechRepublic | James Sanders | February 22, 2018 Just in the past six months, documents...
Today, as the culmination of many months of work and testing, we are proud to announce the official launch of our new Domain Risk Score. As part of our ongoing...
The context for why Whois data is extremely relevant for cybersecurity is not obvious to most people. Unless one has a background in DNS, threat analysis or attack attribution, or...
This Valentine’s Day, keep the DMs (mostly) open but stay cautious when online I know that for you and that special someone (or the special someone you’re hoping to meet),...
Articles from February 3-9 This phishing trick steals your email and then fools your friends into downloading malware ZDNet | Danny Palmer | February 8, 2018 There's been a spike...
Articles from January 27 – February 2 BeeToken customers duped out of $1 million worth of Ethereum in phishing scam SC Magazine | Robert Abel | February 1, 2018 BeeToken...
*The following blog solely represents the views of Emilio Casbas In the context of online counterfeiting, there are four classes of domain that warrant discussion: Registered by counterfeiters Free hosting...
Articles from January 20-26 NonPetya ransomware forced Maersk to reinstall 4000 servers, 45000 PCs ZDNet | Charlie Osborne | January 26, 2018 Maersk has revealed that a devastating ransomware attack...
When it comes to profiling adversaries and mapping their infrastructure, more data is definitely better. Think about it this way: if you were about to land on an enemy beach...
Articles from January 13-19 US hospital pays $55,000 to hackers after ransomware attack ZDNet | Charlie Osborne | January 17, 2018 Hancock Health has paid hackers $55,000 to unlock systems...
Whois data is at a crossroads in 2018, under duress from EU data protection regulations, from within ICANN itself, and even from the Registrars and Registries that collect and store...
Articles from January 6-12 Russian hackers are targeting U.S. Senate email accounts TechCrunch | Taylor Hatmaker | January 12, 2018 According to a new report, the same group that hacked...
Enjoy a guest blog written by Collin Anderson as a supplement to his published work "Iran’s Cyber Threat: Espionage, Sabotage, and Revenge". Collin Anderson is a Washington, DC–based researcher focused...
Articles from December 29 – January 5 Cloud-based docs the new frontier for phishing attacks SC Magazine | Doug Olenick | January 4, 2018 Google App Scripts, the Javascript development...
In a previous DomainTools Report conducted in the summer of 2016, we leveraged DomainTools extensive dataset in order to examine the distribution of malicious or neutral domains across a set...
10 things in cybersecurity that you might have missed this year ZDNet | Zack Whittaker | December 29, 2017 Thought you caught everything in security this year? There was a...
2017 has been a fast-paced and exciting year. We had a multitude of product releases and updates including our latest version of Iris with Passive DNS. In addition, we announced...
Between widespread security lapses, phishing scams, and the seemingly never-ending series of hard-hitting ransomware breaches, organizations and individuals were plagued by an unprecedented number of cyberattacks in 2017. After one...
Articles from December 9-15 Suspected North Korean cyber group seeks to woo bitcoin job seekers Reuters | Eric Auchard | December 15, 2017 The surging price of cryptocurrencies in global...
Salutations! I always enjoy the opportunity to put a spotlight on our wonderful employees. Not only does it give me an opportunity to get to know my colleagues better, it...
Articles from Dec 4-8 North Carolina officials refuse to pay ransomware hackers, following expert advice NBC News | Chelsea Bailey | December 7, 2017 Officials in North Carolina’s Mecklenburg County...
The DomainTools product team is constantly on the lookout for ways to make the Iris experience smoother, more efficient, and more pleasing. To that end, we have released a set...
Articles from November 25 to December 1 Enterprise phishing attacks surge but resiliency is on the rise ZDNet | Charlie Osborne | November 30, 2017 Every successful phishing campaign costs...
The title of this blog could lead you to believe that this post is an advertisement for the newest doorbell camera. It isn’t. The front door I am referring to...
Articles from November 17-23 How Recent Attacks Might Raise the Bar in Cybersecurity Forbes | Robert Vamosi | November 22, 2017 After more than two decades, malware attacks have started...
Murphy's Law: "Anything that can go wrong will go wrong." As a Data Systems Engineer, I write and maintain the systems we use to gather, process, and analyze our large...
Articles from November 11-17 Pentagon exposed some of its data on Amazon server CNN Money | Selena Larson | November 17, 2017 A researcher says the Pentagon exposed huge amounts...
I’d like to go over a few things that you should know before going online to shop on Black Friday, or Cyber Monday. There are lots of criminals who are...
Articles from November 4-10 What a cyberwar with North Korea could look like, according to a cybersecurity expert Business Insider | Chris Snyder | November 10, 2017 North Korea has...
New Survey Reveals US and UK Consumers at Risk This Holiday Shopping Season Among the most important aspects of combatting cybercrime are intelligence sharing and education. As part of the...
Articles from October 28 – November 3 WannaCry, Cerber most used ransomware types, hospitals most hit sector SC Magazine | Doug Olenick | November 3, 2017 WannaCry and Cerber has...
Articles from October 22-28 Hackers Behind Crippling Cyberattacks Worldwide Earlier This Year Probably Involved With BadRabbit Fortune | Reuters Staff | October 26, 2017 Hackers responsible for a crippling cyberattack...
On the side of police vehicles, you’ll often see the motto “To Protect and Serve” — except in the Transformers movies where the police car has the motto “To Punish...
Articles from October 13-20 New Locky Ransomware Strain Emerges Dark Reading | Dawn Kawamoto | October 19, 2017 Locky authors have again retooled the highly persistent ransomware campaign with a...
There are many reasons I love working for DomainTools including a fully-stocked fridge (good food inspires great puns), traditions like "thirsty Thursday" (also known as Whisky Business), and endless ping...
Articles from October 7-13 Hyatt Hotels Suffers 2nd Card Breach in 2 Years Krebs on Security | Brian Krebs | October 12, 2017 Hyatt Corp. is alerting customers about another...
October is Cybersecurity Awareness Month, a time to dust off the cobwebs, look under the bed for monsters, and check your computer for zombies. While rapid advances in technology have...
Articles from September 30 – October 6 This sneaky phishing attack hijacks your chats to spread malware ZDNet | Danny Palmer | October 6, 2017 Hackers are intercepting legitimate email...
In the infosecurity space, we often fall short when it comes to defining the distinction between and value of indicators of compromise (IOCs) and indicators of attack (IOAs). There are...
Articles from September 23-29: The list grows: Whole Foods hit by hackers CNN Money | Jackie Wattles | September 28, 2017 Whole Foods Market — which was recently acquired by...
Q3 has been an exciting time to be at DomainTools. This quarter we announced quite a few product improvements including Iris Collaboration Features, and the promise of Threat Profile. Additionally,...
Articles from September 16-22 SEC discloses cybersecurity breach Politico | Patrick Temple-West | September 20, 2017 The Securities and Exchange Commission on Wednesday said its “EDGAR” public-company filing system had...
As a proud jorts-wearing Floridian, I learned early on to be wary of hurricane season. Hurricane watches turn into warnings while those on the ground scramble for bottled water and...
Articles from September 9-15 Vevo Hackers Leak — Then Delete — Huge Trove of Internal Videos, Documents Variety | Todd Spangler | September 15, 2017 A notorious hacker group broke...
I love two-wheeled vehicles. Motorcycles, dirt bikes — anything that has two wheels makes my heart smile. However, when I traded a motorcycle helmet for a stroller and bottle warmer...
- Welcome!
- NameBee aggregates blogs for the Domain Name industry.
- Custom Feeds
- Add any RSS feed to the information you read daily.
- Blocked Feeds
- Block feeds to remove blogs you’re not interested in.
- Account Settings
- Customize the site by adding or removing feeds.
Don’t have an account yet?
- Customize your settings
- Edit how your blog displays
- Add or remove blogs you read. Sign Up.
About Us
NameBee is your source for all your Domain Name news.
Have a Suggestion for Us?
|
Know of a Domain Name blog that we're missing? Let us know!
|