Changes

Jump to navigation Jump to search
Line 143: Line 143:  
# create the domains in order to suspend or [[DNS sinkholing|sinkhole]] the domains for victim identification
 
# create the domains in order to suspend or [[DNS sinkholing|sinkhole]] the domains for victim identification
 
====Reputation Industry====
 
====Reputation Industry====
 +
Commercial service providers, researchers, and non-profit organizations operate the most prominent [[RBL]]s that detect or receive notifications of security threats. Some key players include:
 +
* [[Spamhaus]],
 +
* Cisco’s [https://talosintelligence.com/reputation_center Talos] email reputation system,
 +
* [https://apwg.org/ the Anti-Phishing Working Group's RBL],
 +
* [https://safebrowsing.google.com/ Google Safe Browsing],
 +
* [http://www.surbl.org/ SURBL], and
 +
* [https://www.threatstop.com/ ThreatStop].
 +
 
====End Users====
 
====End Users====
 
End users, even those who work in the DNS industry, need help managing DNS Abuse mainly because of the timeless effectiveness of [[Social Engineering Attacks]]. For instance, at the end of 2020, [[GoDaddy]] notoriously tested its workers to see if they would share sensitive information after clicking on dubious links from a spoofed email.<ref> [http://domainincite.com/26143-godaddy-pranks-employees-with-insensitive-phishing-test GoDaddy Pranks Employees, DomainIncite]</ref>
 
End users, even those who work in the DNS industry, need help managing DNS Abuse mainly because of the timeless effectiveness of [[Social Engineering Attacks]]. For instance, at the end of 2020, [[GoDaddy]] notoriously tested its workers to see if they would share sensitive information after clicking on dubious links from a spoofed email.<ref> [http://domainincite.com/26143-godaddy-pranks-employees-with-insensitive-phishing-test GoDaddy Pranks Employees, DomainIncite]</ref>
Bureaucrats, Check users, lookupuser, Administrators, translator
14,952

edits

Navigation menu