Look-alike domains remain some of the most consistent elements of cyber attacks targeting organizations. At a high-level, there are two ways to mitigate the threat of a
look-alike domain: remove the threat completely by taking it offline, or block attacks on your users by implementing IT security controls. If we dissect the construction of a look-alike domain, we see where each step in its creation represents a point where actions can be taken to mitigate the threat.
look-alike domain: remove the threat completely by taking it offline, or block attacks on your users by implementing IT security controls. If we dissect the construction of a look-alike domain, we see where each step in its creation represents a point where actions can be taken to mitigate the threat.
The post Look-alike Domain Mitigation: Breaking Down the Steps appeared first on Security Boulevard.
The post Look-alike Domain Mitigation: Breaking Down the Steps appeared first on Malware Devil.
https://malwaredevil.com/2020/12/21/look-alike-domain-mitigation-breaking-down-the-steps-4/?utm_source=rss&utm_medium=rss&utm_campaign=look-alike-domain-mitigation-breaking-down-the-steps-4

No comments:
Post a Comment