Page 26 - Cyber Defense Magazine - Global Print Edition 2018
P. 26
THREAT INTELLIGENCE:
5 APPLICATIONS OF
CONNECTED DOMAINS
by Jonathan Zhang, Founder and CEO, Threat Intelligence Platform
any organizations are turning connect exactly? Roughly speaking, it look at five situations in which you
towards threat intelligence can happen through infrastructure in probably want to check for connected
to reduce the occurrence of the form of shared hosting, IP addresses, domains names and the reasons why.
Mcyber attacks. Sure enough, and name servers, as well as common 1. Phished Well-Known
the practice can help security specialists registrant details — names, physical
prevent scams and hacks in various location, emails addresses — and Organizations
ways. One of them, quite inevident at confusingly similar names. Hackers, like all criminals, have a
first sight yet effective in practice, lies knack for forgery. And reputable
in taking a closer look at connected There is a lot to learn from these organizations are the perfect means
domains. connections as they may be at the basis to conduct social engineering
of vulnerabilities in your or somebody attacks since they are trusted by
But first thing first. How do domains else’s cyber defense. In this article, let’s customers, employees, and people
26 CYBER DEFENSE MAGAZINE – ANNUAL GLOBAL PRINT EDITION 2018 – SPONSORED BY TREND MICRO