Malware Devil

Wednesday, October 21, 2020

Eliminating the Threat of Look-alike Domains

There are many ways look-alike domains can be used by threat actors. While business email compromise (BEC) and phishing sites are often top-of-mind for defenders, there are dozens of other uses for look-alike domains. This variation, as well as diverse registrar requirements for removal, can make mitigating look-alike domains a complex, burdensome, and often ineffective process.
 
In this post, we examine steps to mitigate the internal and external risk posed by look-alike domains. 

The post Eliminating the Threat of Look-alike Domains appeared first on Security Boulevard.

Read More

The post Eliminating the Threat of Look-alike Domains appeared first on Malware Devil.



https://malwaredevil.com/2020/10/20/eliminating-the-threat-of-look-alike-domains/?utm_source=rss&utm_medium=rss&utm_campaign=eliminating-the-threat-of-look-alike-domains

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...