Snapshot of Global Traffic Abuse



Why Cloudmark?

Cloudmark is the most trusted leader in security — protecting traffic, data and infrastructure. We safeguard service providers, enterprises and consumers worldwide with immediate, predictive protection from ever-evolving network threats.

Cloudmark Security Platform for DNS

What’s lurking in your DNS environment?

Get a free traffic analysis and gain valuable insight into the state of your DNS security.

You could already be breached and losing data, supporting rouge traffic, or enabling unauthorized access to your network.

Sign Up for Analysis

Cloudmark Webinars

  • Domain Name System (DNS) infrastructure is critical to both the Internet and most private networks, however, many recent events have shown that it is vulnerable to attack, affecting millions of users when it goes down. There are tools and processes enterprises and service providers can use to protect DNS infrastructure but real protection is difficult to achieve due to the scope of the problem. This webinar provides a detailed look at the threats to DNS infrastructure and how those threats can be mitigated.

  • This webinar discusses how Application-to-person (A2P) SMS has increasingly become a key method for organizations to communicate with their customers. This has been driven by the ubiquity of mobile phones and the universality of SMS. Unfortunately, this has also lead to a massive growth in messages being sent through illegitimate routes that bypass the operators’ billing systems. This is commonly referred to as grey routes carrying grey traffic, and is a tactic commonly used by third-party aggregators to boost their own profitability. The result is lost revenue for mobile operators who often do not have visibility and control of messages on their network.

See more Cloudmark webinars

Cloudmark's 3Q 2014 Security Threat Report

This quarter Cloudmark tracked the first major Apple iMessage spam campaign in the U.S. — accounting for more than 40 percent of monthly reported mobile spam. Our investigation into the promise of fake designer products led to an unexpected end — actual merchandise! Across the pond, UK businesses didn’t receive tickets to a Peter Pan performance but instead got Trojan attachments hoping to lure in victims. Meanwhile, analysis of DNS resource exhaustion attacks in Southeast Asia led to the discovery of interesting sub-domain generation patterns. Find more on these topics, Belarus' long-term spam improvements and other trends around the globe in Cloudmark's 3Q 2014 Security Threat Report.

Get more Trends and Insights

Recent Blog Posts

  1. North Korea: Hackers or Hacked?

    Jan 9, 2015 by Andrew Conway

    Attempting to attribute the Sony Pictures Entertainment attack to North Korea is complicated by the fact that a worm active in that country may be allowing foreign hackers access to computers within North Korea. While there is no evidence computers infected with this worm were involved on the attack on Sony, any attribution based on […]

    Continue reading...

  2. ICO Warns Optical Express to Stop Sending SMS Spam in UK

    Jan 6, 2015 by Andrew Conway

    Not all SMS spam is sent by cyber criminals or con men. Businesses that are too eager to promote their products can often cross the line from legitimate marketing into spam. A company called Optical Express, for example, is one of the most persistent line crossers in the UK. Based on reports to the mobile […]

    Continue reading...

Read more from the Cloudmark blog

Cloudmark Videos

Javascript must be enabled to view videos.
DNS Leads to DDoS

DNS Leads to DDoS

Cloudmark CTO Neil Cook explains how DNS networks can be a gateway for DDoS attacks.

Cloudmark Security Platform for DNS

Cloudmark Security Platform for DNS

The Cloudmark Security Platform for DNS provides automatic, real-time detection and prevention of resource exhaustion and other DNS-related threats. Cloudmark’s patented solutions deliver immediate, adaptive and predictive protection from ever-evolving network threats with proven, carrier-grade scalability and operability, assuring business continuity while lowering infrastructure costs.

See more videos

Cloudmark News

  • SC Magazine

    Cyber Threat Developments in 2015

    January 5, 2015 by Andrew Conway

    "Notable events included the growth of encryption-based ransomware, a series of several high-profile breaches impacting major retailers and the exposure of several highly sophisticated state-sponsored espionage attacks. We anticipate that these threats will continue to mutate in the coming year."

  • eWeek

    Cyber Attackers Increasingly Sneaking Data Out Through DNS

    December 17, 2014 by Robert Lemos

    "For years, researchers have studied the use of domain-name service (DNS) traffic as a way to hide attackers’ communications. Now, companies are increasingly encountering the tactic, according to a survey released on Dec. 16 by infrastructure-security firm Cloudmark."

  • DNS Attacks Ravage Three-Quarters of U.S. / UK Firms

    December 16, 2014 by Phil Muncaster

    "Half of UK and US firms have suffered some form of DNS-related attack in the past year, leading to data loss and business downtime, according to new research from Cloudmark."

See more Cloudmark news

Cloudmark Customers

The world’s top communications service providers turn to Cloudmark to protect their networks.

  • AT&T
  • Bell
  • Comcast
  • Cox Communications
  • GoDaddy
  • Optus
  • Rackspace
  • T-Mobile
  • Sprint
  • Verizon
Intelligent blocking provides significant savings on downstream messaging infrastructure and improved customer experience.
—Veenod Kurup
VP Data Product Service
Cox Communications
Site Map  •  Privacy Policy  •  ©2002–2015 Cloudmark, Inc.