114 major brands. Thousands of spam emails. One sophisticated phishing operation. These numbers point to the rise of a new phishing-as-a-service (PhaaS) platform known as “Morphing Meerkat.” Cybersecurity researchers say it represents a leap forward in how attackers deceive victims and steal credentials. Businesses worldwide need to understand both the risk and the ... View Post
Our latest blog posts
Trust No Packet: DNS Queries Can Be Your Firewall’s Weakest Link
Organizations spend millions on cutting-edge firewalls, intrusion detection systems, and network monitoring tools. Yet despite these sophisticated defenses, one of the internet's most basic protocols continues to be a major security vulnerability: the Domain Name System (DNS). The problem isn't with DNS itself—it's with how much we trust it. Network administrators ... View Post
Can DNS Be Used to Hack AI Chatbots?
Short answer: Only If You've Already Been Hacked Fascinating game of "telephone" over the past week which started out as some research on how hackers could embed images into DNS TXT records, and wound up proclaiming, "Newly published research shows that the domain name system—a fundamental part of the web—can be exploited to hide malicious code and prompt injection ... View Post
Nameserver Delegation Security: The Technical Guide for Web3 Infrastructure Teams
Nameserver delegation represents a critical security control point for Web3 projects. While blockchain transactions may be secured by cryptographic protocols, the DNS infrastructure directing users to your platform remains vulnerable to attacks. This technical guide explains how to secure nameserver delegations for crypto, DeFi, and Web3 ... View Post
Registry Locks vs. Registrar Locks: The Critical Difference Your Security Team Should Know
Domain security for crypto projects requires multiple layers of protection. Two essential security measures—registry locks and registrar locks—are frequently confused, leading to dangerous security gaps. Understanding the difference is critical for protecting your Web3 platform from domain hijacking attacks. --- Want to learn more about DNS Security for your ... View Post
Centralized Risks in Decentralized Projects: Mapping Your Complete Attack Surface
Decentralization is a core principle of Web3, yet most crypto projects rely on centralized infrastructure components that create significant security vulnerabilities. Understanding your complete attack surface requires mapping both decentralized and centralized elements of your architecture. Explore our full guide: Domain & DNS Security for Crypto, DeFi and ... View Post