The Anatomy of a Look-alike Domain Attack

The Anatomy of a Look-alike Domain Attack

Cybercriminals register hundreds of thousands of look-alike domains every year to impersonate reputable organizations and make a profit. These domains are used for a variety of attacks including phishing emails, fraudulent websites, web traffic diversion, and malware delivery ... Read More
What is a Look-alike Domain?

What is a Look-alike Domain?

By definition, a look-alike domain is a nearly identical, slightly altered domain name, registered with intent to deceive ... Read More
Gartner Releases Emerging Tech Report: Critical Insights into Digital Risk Protection

Gartner Releases Emerging Tech Report: Critical Insights into Digital Risk Protection

Driven by expanding use cases, approachable intelligence, and the incorporation of premium services, demand for Digital Risk Protection Services (DRPS) has grown over the last 12 months and continues to increase ... Read More
APWG Year-End Report: 2019 A Roller Coaster Ride for Phishing

APWG Year-End Report: 2019 A Roller Coaster Ride for Phishing

| | APWG, bec, HTTPS, social media
The latest Phishing Activity Trends Report from the Anti-Phishing Working Group (APWG), which compiles insights from member companies, announced that the year-end number of reported phishing websites for 2019 reached a record high. Most menacing; however, are the trends of phishing gangs targeting users of web-hosted email, social media, and ... Read More

Secure Guardrails