Cloudmark is the most trusted leader in security — protecting traffic, data and infrastructure. We safeguard service providers, enterprises and consumers worldwide with immediate, predictive protection from ever-evolving network threats.
What’s lurking in your DNS environment?
As an enterprise or service provider, you could already be breached and losing data, supporting rogue traffic, or enabling unauthorized access to your network.
It's been a hot year for DNS. In our 2014 Annual Security Report we take a look at various forms of DNS abuse including DNS amplification, tunneling, exfiltration, and a study of DNS resource exhaustion at a major ISP. In the email space, bootleg Viagra® spam is a staple. This year, Cloudmark commissioned a chemical analysis of various samples from these fake pharmacies to determine just how legitimate and possibly dangerous these pervasive ads might be. Mobile customers have had their own woes this year with the largest targeting of Apple iMessage by spammers seen to date and we completed similar investigative research into this campaign. Our report details an investigation into the origins and on-going legal battle against these spammers and their evolving campaigns.
Domain Name System (DNS) infrastructure is critical to both the Internet and most private networks, however, many recent events have shown that it is vulnerable to attack, affecting millions of users when it goes down. There are tools and processes enterprises and service providers can use to protect DNS infrastructure but real protection is difficult to achieve due to the scope of the problem. This webinar provides a detailed look at the threats to DNS infrastructure and how those threats can be mitigated.
This webinar discusses how Application-to-person (A2P) SMS has increasingly become a key method for organizations to communicate with their customers. This has been driven by the ubiquity of mobile phones and the universality of SMS. Unfortunately, this has also lead to a massive growth in messages being sent through illegitimate routes that bypass the operators’ billing systems. This is commonly referred to as grey routes carrying grey traffic, and is a tactic commonly used by third-party aggregators to boost their own profitability. The result is lost revenue for mobile operators who often do not have visibility and control of messages on their network.
Recently we have seen email spam promoting two particularly vile medical scams. Both of these scams appear to be operated from the same source, a ClickBank affiliate called “traffictem”. The spammer promoting them is may not be directly connected with the scams but is simply being paid for traffic via the ClickBank affiliate program. Here’s […]
Like any sender, spammers will always find ways to maximise their profits by reducing their costs per campaign. As anti-spam techniques have evolved over the years to look at the reputation of domain names and URLs within messages so spammers have found more ways to leverage the reputation of other entities at little to no […]
RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. Throughout its history, RSA Conference has consistently attracted the world's best and brightest in the field, creating opportunities for conference attendees to learn about IT security's most important issues through first-hand interactions with peers, luminaries and emerging and established companies.
"Andrew Conway, a research analyst at security firm Cloudmark, told CBS News he has already begun seeing a flurry of phishing emails disguised as requests from the IRS."
"Hackers claiming to hail from the notorious Lizard Squad group have been gloating online after appearing to take down Xbox Live again with a DDoS attack."
"A huge spam campaign has been installing the Dyreza banking Trojan on tens of thousands of UK computers, specifically targeting those with accounts at major banks."
The world’s top communications service providers turn to Cloudmark to protect their networks.
Intelligent blocking provides significant savings on downstream messaging infrastructure and improved customer experience.—Veenod Kurup