Attackers are using links to spoof Google Calendar invites to steal user credentials with the goal of financial scamming. Get the full story from Dark Reading here: https://lnkd.in/espAM7WB
DomainTools
Computer and Network Security
Seattle, WA, Washington 21,132 followers
Detect. Investigate. Prevent.
About us
DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify external risks, investigate threats, and proactively protect their organizations in a constantly evolving threat landscape. DomainTools constantly monitors the Internet and brings together the most comprehensive and trusted domain, website and DNS data to provide immediate context and machine-learning driven risk analytics delivered in near real-time. Visit domaintools.com to experience firsthand why DomainTools is the first stop for advanced security teams when they need to know.
- Website
-
https://www.DomainTools.com
External link for DomainTools
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- Seattle, WA, Washington
- Type
- Privately Held
- Founded
- 2004
- Specialties
- Domain Ownership Records, Brand Protection, Whois Records, Threat Investigation, Cybercrime Investigation, Cyber Security Investigation, Whois History, Reverse Whois Lookup, Name Server Monitoring, Online Fraud Detection, and Threat Intelligence
Locations
-
Primary
2101 Fourth Avenue
Suite 1720
Seattle, WA, Washington 98121, US
-
2101 4th Ave
Seattle, WA 98121, US
Employees at DomainTools
Updates
-
Interpol replaced the term 'pig butchering' with 'romance baiting.' Get more info on the switch and a brief history of the scam tactics from BleepingComputer here: https://lnkd.in/eNeAVTK3
Interpol replaces dehumanizing "Pig Butchering" term with "Romance Baiting"
bleepingcomputer.com
-
DomainTools reposted this
It is difficult to make predictions, especially about the future. Instead of making 2025 Cybersecurity predictions ourselves, we thought it would be fun to ask several leading LLMs to make predictions and we'd review and critique them. Give it a watch/listen! Listen on Apple Podcasts: https://lnkd.in/gTARK5BH Spotify: https://lnkd.in/gsMcumhu Watch on YouTube: https://lnkd.in/giuUKZ8F
2025 Cybersecurity Predictions: AI, Ransomware, and Quantum Threats
podcasts.apple.com
-
What's the future of healthcare security? AI has possibilities to analyze massive amounts of data and prioritization. SBOM ubiquity across industries can be incredibly helpful as well. We're all producers and consumers and we need transparency and SBOMs to ensure we all have visibility in what we're getting and what we're deploying. Ken Zalevsky of VigilantOps shares more detail on a recent episode of the Breaking Badness Cybersecurity Podcast: Apple Podcasts: https://lnkd.in/gZK8TCYW Spotify: https://lnkd.in/gRQRAbih YouTube: https://lnkd.in/g27ZrWWf #cybersecurity #healthcaresecurity
-
It's back (back again! 🎵 ) That's right - Breaking Badness is covering our 2025 cybersecurity predictions for the third year in a row! But we have something special cooked up for how we approached it this year. Join Kali Fencl, Sean McNee, Tim Helming, and Daniel Schwalbe as they look back at how our 2024 predictions fared and what may occur in the new year. Listen on Apple Podcasts: https://lnkd.in/gTARK5BH Spotify: https://lnkd.in/gsMcumhu Watch on YouTube: https://lnkd.in/giuUKZ8F
-
Nation-state hackers continue to exploit the weak U.S. response to cyberattacks, according to experts. Why it matters? Sam Sabin shares on Axios here: https://lnkd.in/eu8iQSux #CyberSecurity #Telcos #NationState #Hacking
Turning up the heat on Chinese government hackers requires a new approach, experts say
axios.com
-
If you haven't yet, check out Allan Liska's presentation at SLEUTHCON on why we need to ban ransomware payments. He reviews both sides of the argument and makes the presentation incredibly lively and colorful. Watch here: https://lnkd.in/gFSzFvMe #Ransomware #CyberSecurity
-
Why do people start hacking? Is it the payout? The clout? All of the above? Ian Campbell shares his thoughts with Cybernews here: https://lnkd.in/gmz_XZhw #CyberSecurity #Hacking #BugBounty
Hacker bounty fever: dopamine spikes and millions of dollars | Cybernews
cybernews.com
-
What are the key considerations for vulnerability evaluation? And what can we learn from large-scale incidents? Audra Streetman shares her insights with Dark Reading here: https://lnkd.in/eCnAb-Zs #CyberSecurity #Log4J #ZeroDay #MOVEit
The Art of Vulnerability Prioritization
darkreading.com
-
Hackers are constantly evolving, and so too should our security protocols. Friend of the podcast, Pukar C. Hamal (SecurityPal) shares his insights with Dark Reading with tips for ensuring your data, privacy, and information assets are secured and protected in 2025 Learn more here: https://lnkd.in/gyrXq8M6 #CyberSecurity #ProactiveSecurity #RiskAssessment
Tips for Preventing Breaches in 2025
darkreading.com