Blog Post

How Nominum Data Science Thwarts Cybercrime Through Industry-Leading DNS Data Analysis

By Yohai Einav, Nominum Data Science

Nominum Data Science Thwarts Cybercrime

Posted on December 6, 2016 in: Security

Tags: , ,

Nominum’s inaugural security report published by its Data Science team, Data Revelations: Fall 2016, includes an analysis of some of the largest threats that are impacting organizations and individuals, including ransomware, DDoS, mobile malware, IoT-based attacks and more. Since DNS is the launch point for over 90% of cyberattacks, it offers a great vantage point from which to examine, understand, thwart and proactively prevent threats1. With industry-leading research experience, and by applying machine learning, artificial intelligence, natural language processing, neural networks and more, Nominum Data Science is able to locate, analyze, prevent and predict some of the most sophisticated and dangerous cyberthreats ever to hit the internet.

Read more

Blog Post

The Rise in DDoS and other Cyberattacks: Applying New Data Science Insights to Understand Today’s Emerging Threats

By Yuriy Yuzifovich, Head of Data Science and Security

Posted on November 3, 2016 in: General, Security

Tags: ,

Nominum Data Science just released a new Data Science and Security report that investigates the largest threats affecting organizations and individuals, including ransomware, DDoS, mobile device malware, IoT-based attacks and more. Below is an excerpt.

Read more

Blog Post

What CSPs Can Learn from the Latest DDoS Attacks

By Craig Sprosts, Vice President, Product Management & Strategy

Posted on October 24, 2016 in: General, Security

Tags: , ,

On Friday, October 21, 2016, there was a major distributed denial of service (DDoS) attack that took down major U.S. company websites, including Twitter, Paypal, The New York Times, Box, Netflix and more. The attack targeted managed DNS provider Dyn Inc., which hosts the authoritative DNS for these popular domains. The attack originated from a large number of compromised IoT devices, including internet-connected cameras, routers and digital video recorders.

Read more

Blog Post

Examining the Long-Tail of DNS Queries: A Hotbed of Cybercriminal Activity

By Yuriy Yuzifovich, Head of Data Science and Security

Posted on October 11, 2016 in: General, Security

Tags: , ,

Data scientists put in a tireless amount of work tracking cybercriminals—from specific individuals to entire organizations—looking at their behavior and the methods through which they attempt to compromise data. Because DNS is a ubiquitous protocol that’s used for most internet interactions, it also provides fertile ground for cybercriminals to launch malware. Nominum Data Science examines massive volumes of DNS data—100 billion queries daily—to detect anomalies and uncover the patterns of malicious code authors before other security experts.

Read more

Blog Post

Predicting Dynamic Malware Threats

By Bruce Van Nice

predicting-dynamic-malware-blog

Posted on June 20, 2016 in: General, Marketing, Network, Security

Tags: , , , , , ,

We just released a new whitepaper outlining the upcoming types of cyberthreats and malicious activity affecting digital consumers, and how organizations and operators can address them. Below is an excerpt. To read the full report, click here to download.

Read more

Blog Post

DNS: The “Third Way” to Digital Transformation

By Patrick Donegan, Heavy Reading

JK Bridge in Brasilia, Capital of Brazil

Posted on June 13, 2016 in: General, Marketing, Network, Security

Tags: , , , , ,

Last week we launched a new whitepaper by Patrick Donegan of Heavy Reading, titled “Innovation in Communications Services: Breaking with the Past without Waiting for the Future.” The paper discusses a ‘third way’ to service provider digital transformation, utilizing DNS. Read the blog post below for an excerpt from Donegan’s paper, which you can download in its entirety here.

Read more

Blog Post

Unlocking Locky

By Mikael Kullberg, Nominum Data Science

Locky

Posted on June 2, 2016 in: General, Network, Security

Tags: , , , , ,

Locky is a new cyberthreat that has received a lot of attention in security circles over the last few months because it has been unusually successful. Locky is advanced ransomware that encrypts a person’s files and holds them for ransom. It uses a number of different technologies to avoid being detected or blocked and takes great care to hide its path back to the attackers. The code is obfuscated to avoid detection by antivirus and malware software. The blackmailers communicate through TOR and only accept Bitcoin as payment, making it nearly impossible to discover who they are.

Read more

Blog Post

Cross-organizational Use Cases Show Value of DNS in Digital Transformation

By Sandy Wilbourn, SVP Engineering

Nominum use case honeycomb

Posted on May 19, 2016 in: General, Marketing, Network, Security

Tags: ,

There’s been a lot of buzz about digital transformation. For me, transformation is really about service providers delighting their customers. The other day I was speaking with a provider in EMEA that recently did a pilot with our N2 Reach subscriber communications solution to upsell higher data usage options to subscribers who are at 80% of bandwidth. We see this use case every day, especially as video streaming usage is escalating. The pilot was so successful that they’re now rolling out a program to their entire subscriber base. Digital transformation is really about thinking of customers, their changing needs, and device and communication preferences, and meeting them where they are most likely to pay attention.

Read more

1 2 3 4 5 8