

Corin Imai
Senior Security Advisor feature_status*/ ?>
DomainTools
Comments Dotted :
16
December 01, 2020
It shows how difficult campaigns of interference in domestic political matters can be to spot.
The news that the Kremlin’s extensive covert social media apparatus has been mobilised behind the ‘grassroots’ campaign to have Jacob Rees-Mogg become the next UK PM should come as no surprise; As an ardent Brexiter Rees-Mogg would be a welcome change to the current leadership in the eyes of a Russia who want to see the European Union weakened. What is as surprising as it is worrying is that #Moggmentum has been presented as a grassroots social media campaign supported by Conservative.....Read More

June 11, 2020
Attackers always hope their campaigns will reach the less tech-savvy users.
Google’s work to inform the public on the regional Covid-19-themed phishing attacks is certainly valuable to protect users from these opportunistic campaigns. It should come to no surprise that cybercriminals are trying to capitalise on this global crisis in every way they can: in March, when countries were just entering lockdown, DomainTools identified over 600 malicious domains associated with the Coronavirus pandemic.
The best thing that can be done in these circumstances is to raise.....Read More

April 22, 2020
The SBA, on its part, will have to take all the necessary steps to restore the trust of the businesses it exists to support.
Although contained in size, this data breach is unfortunate both because of the sensitivity of the information exposed and because of the nature of the institution involved.
Information is still too limited to assess the potential impact of the incident, but despite no signs of the data being used for malicious purposes, it is still important for all the affected parties to watch out for socially engineered attacks such as spear phishing and BEC compromise. The SBA, on its part, will have to.....Read More

March 09, 2020
Usability issues are notoriously a hindrance when it comes to protecting users from phishing.
Usability issues are notoriously a hindrance when it comes to protecting users from phishing. Most of the time, phishing attempts are successful not because they are particularly well designed, but because the receiver instinctively clicks on a link or downloads an attachment with productivity and business operations in mind.
Google’s upgrade on 2FA, designed to encourage the adoption of extra security measures, is definitely a welcome step in the right direction. The more email providers.....Read More

February 19, 2020
Statistics around the skills shortage are never in short supply, but remain concerning regardless.
Statistics around the skills shortage are never in short supply, but remain concerning regardless. A recent report from the ISC2 claims a 145% increase in global workforce is needed to alleviate cybersecurity hiring concerns, as the threat landscape grows exponentially. This year’s DomainTools and Ponemon report on cybersecurity hiring and automation, which surveyed over one thousand IT professionals, found that the majority of respondents believed that automation will decrease the security.....Read More

February 13, 2020
Unfortunately, in the wake of a data breach, criminals often exploit the circumstances to plan campaigns aimed at capitalising.
Cybercriminal operations thrive off the kind of data that this database left exposed: sensitive personal identifiable information can be sold online and exploited in all sorts of subsequent campaigns. Fortunately, security researchers promptly brought the misconfiguration to the attention of Estee Lauder, who quickly secured the database.
Although there is no evidence that data was stolen, people potentially affected should be weary of any email they receive that requests them to reset their .....Read More

February 06, 2020
WhatsApp has an estimated 1.5 billion monthly users.
The fact that this vulnerability exists in such a prominent messaging platform is definitely a cause for concern. WhatsApp has an estimated 1.5 billion monthly users, and in developing democracies such as India where WhatsApp counts 200m user base, it has become a substitute of town-square talk. Users in India would have their ‘family’ and ‘friends’ chat groups, but often also use third-party apps to find and join WhatsApp groups aligned with their political views. For a vulnerability.....Read More

January 13, 2020
Granted that it has become increasingly difficult to tell phishing messages from legitimate ones.
Educational institutions and schools are urged not to underestimate the risks associated with phishing. Malicious emails are often just entry vectors for larger-scale attacks, and should, therefore, be at the top of organisations' priorities when devising a cybersecurity strategy.
Granted that it has become increasingly difficult to tell phishing messages from legitimate ones, organisations should instruct employees not to click on any link received by an external email address and not to.....Read More

December 18, 2019
How enterprises need to protect themselves in ways unimaginable in the past.
This kind of activity, likely perpetuated by a nation-state or serious organised crime group with the funds and man power to undergo such an operation, is an example of how enterprises need to protect themselves in ways unimaginable in the past; Industrial companies which fall under the remit of critical national infrastructure are just as valuable targets to a hostile nation state or an organised cybercriminal group as a government agency, and should defend themselves as such, employing the.....Read More

November 13, 2019
The incident is an example of just how susceptible to cybercriminal activity our democratic process can be.
This should be a significant concern to all voters in the UK regardless of their political viewpoints. During a General Election, it is imperative that the main political parties are all given a fair and impartial hearing, and considering the importance of digital campaigning in modern election cycles, a DDoS attack such as this could give other parties an advantage.
While there is no indication of where this cyberattack comes from, and it is obviously encouraging that the Labour party said.....Read More
