Malware Devil

Monday, December 21, 2020

Look-alike Domain Mitigation: Breaking Down the Steps

Look-alike domains remain some of the most consistent elements of cyber attacks targeting organizations. At a high-level, there are two ways to mitigate the threat of a
look-alike domain: remove the threat completely by taking it offline, or block attacks on your users by implementing IT security controls. If we dissect the construction of a look-alike domain, we see where each step in its creation represents a point where actions can be taken to mitigate the threat. 

The post Look-alike Domain Mitigation: Breaking Down the Steps appeared first on Security Boulevard.

Read More

The post Look-alike Domain Mitigation: Breaking Down the Steps appeared first on Malware Devil.



https://malwaredevil.com/2020/12/21/look-alike-domain-mitigation-breaking-down-the-steps-6/?utm_source=rss&utm_medium=rss&utm_campaign=look-alike-domain-mitigation-breaking-down-the-steps-6

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...