This guide outlines what potential data sources, detection methods, context, and remediation actions to consider if you want to effectively monitor domains and mitigate the risk of data loss, exposed credentials, and negative reputational impacts.
Other content in this Stream
Triage effortlessly with superior classification and automated actions with domain alerts.
This infographic details the two high level types of domain impersonation: typosquats and combosquats, and the 10 different strategies used by threat actors.
Typosquatting is a type of malicious domain-impersonation attack where a threat actor seeks to deceive users by creating a URL similar to that of a legitimate site.
This webinar covers the latest research into impersonating domains and provides a demo of SearchLight’s industry-leading domain monitoring capabilities.
$1 for a cheap domain. $12.99 for 10m email contacts. Cybercriminals can launch phishing campaigns for under $20!
In this report, Digital Shadows’ Photon Team analyzed a data set of more than 175,000 impersonating domains raised to our clients over four months of 2021.
This blog will outline the top threats to brands we see online, and some of the best practices for protecting them.
Kacey, Charles, Harrison, and Alex kick off this week’s episode talking about our Fall Dallas team event (an amateur version of Chopped). Then we dig into the hot topics of the week.