Page 26 - Cyber Defense Magazine - Global Print Edition 2018
P. 26

THREAT INTELLIGENCE:



        5 APPLICATIONS OF


        CONNECTED DOMAINS







        by Jonathan Zhang, Founder and CEO, Threat Intelligence Platform





                any organizations are turning  connect exactly? Roughly speaking, it  look  at  five  situations  in  which  you
                towards threat intelligence  can happen through infrastructure in  probably want to check for connected
                to reduce the occurrence of  the form of shared hosting, IP addresses,  domains names and the reasons why.
        Mcyber attacks. Sure enough,  and name servers, as well as common       1. Phished Well-Known
        the practice can help security specialists  registrant details — names, physical
        prevent scams and hacks in various  location, emails addresses — and  Organizations
        ways. One of them, quite inevident at  confusingly similar names.       Hackers, like all criminals, have a
        first  sight  yet  effective  in  practice,  lies                       knack for forgery. And reputable
        in taking a closer look at connected  There is a lot to learn from these  organizations are the perfect means
        domains.                            connections as they may be at the basis  to conduct social engineering
                                            of  vulnerabilities in  your  or somebody  attacks since they are trusted by
        But first thing first. How do domains  else’s cyber defense. In this article, let’s  customers, employees, and people

        26 CYBER DEFENSE MAGAZINE – ANNUAL GLOBAL PRINT EDITION 2018  – SPONSORED BY TREND MICRO
   21   22   23   24   25   26   27   28   29   30   31