A Compilation of Bulletproof Hosting Provider Domains
In need of a fresh and relevant bulletproof hosting provider domain list for research purposes?Check out the following list of domains which I compiled today and decided to share with everyone reading ...
Exposing Russian Business Network’s Mykhaylo Sergiyovich Rytikov’s AbdAllah Internet Hizmetleri Bulletproof Hosting Provider on U.S Secret Service’s Most Wanted Cybercriminals List
I've decided to share with everyone some actionable intelligence on one of the Russian Business Network's primary franchise networks in Turkey namely AbdAllah Internet Hizmetleri which back in the day used to be ...
The Dark Side of Web Hosting Services
While the latest cyber exploits grab headlines, a less-dramatic side of threat activity also deserves attention: bulletproof hosting services (BPHS). These web hosting sites specialize in providing resilient internet hosting services which are ...
Planetary Reef: Cybercriminal Hosting and Phishing-as-a-Service Threat Actor
PhishLabs is monitoring a threat actor group that has set up fraudulent hosting companies with leased IP space from a legitimate reseller. They are using this infrastructure for bulletproof hosting services as ...
MY TAKE: Here’s how ‘bulletproof proxies’ help criminals put compromised IoT devices to work
Between Q1 2019 and Q2 2019, malicious communications emanating from residential IP addresses in the U.S. – namely smart refrigerators, garage doors, home routers and the like – nearly quadrupled for the ...
The Rise of “Bulletproof” Residential Networks
Cybercrooks increasingly are anonymizing their malicious traffic by routing it through residential broadband and wireless data connections. Most often, those connections are hacked computers, mobile phones, or home routers. But this is ...
Meet the World’s Biggest ‘Bulletproof’ Hoster
For at least the past decade, a computer crook variously known as "Yalishanda," "Downlow" and "Stas_vl" has run one of the most popular "bulletproof" Web hosting services catering to a vast array ...
Top 4 website security tips for development and hosting
If you design, develop, or host websites for SMBs, your clients are trusting you to keep their data secure. Here are our top 4 website security tips. The post Top 4 website ...
Who’s Behind the Conti Ransomware Gang? – Part Two
In a series of blog posts I exposed the "The Top Management of the Conti Ransomware Group's Fashion and Charity Brands" including "Who's Behind the Conti Ransomware Gang" where I also offered ...
HYAS Insight Uncovers and Mitigates Russian-Based Cyberattack
Russian-Based Adversary Infrastructure AS200593 In this blog, we review a recent case study and detail how HYAS Insight, an advanced threat intelligence and investigation platform, was used to leverage WHOIS information and ...