Domain Threats Playbook
Eliminating the Threat of Look-alike Domains
There are many ways look-alike domains can be used by threat actors. While business email compromise (BEC) and phishing sites are often top-of-mind for defenders, there are dozens of other uses for ...
How to Detect Look-alike Domain Registrations
Malicious domains are attributed to a wide variety of cyber attacks capable of undermining a brand’s credibility. A spoofed domain is easy and quick to create, and can act as the catalyst ...