There are many ways look-alike domains can be used by threat actors. While business email compromise (BEC) and phishing sites are often top-of-mind for defenders, there are dozens of other uses for look-alike domains. This variation, as well as diverse registrar requirements for removal, can make mitigating look-alike domains a complex, burdensome, and often ineffective process.
In this post, we examine steps to mitigate the internal and external risk posed by look-alike domains.
The post Eliminating the Threat of Look-alike Domains appeared first on Security Boulevard.
The post Eliminating the Threat of Look-alike Domains appeared first on Malware Devil.
https://malwaredevil.com/2020/10/20/eliminating-the-threat-of-look-alike-domains/?utm_source=rss&utm_medium=rss&utm_campaign=eliminating-the-threat-of-look-alike-domains
No comments:
Post a Comment