Subscribe to RSS News Feed
About Spamhaus  |  Press Office  |  FAQs   
Spamhaus News Category: bgp
Spamhaus News Quotes

Permission to quote from or reproduce Spamhaus News articles is granted automatically providing you state the source as Spamhaus and link to the news record.


Categories

all categories
abuse
arin
asn
attack
aws
best practices
bgp
blocklist
botnet
botnets
bounce management
breach
bulk domain registration
bulletproof hosting
cbl
cloud
coi
compromise
compromised
confirmed opt in
css
cybercrime
data hygiene
datasets
dbl
ddos
deliverability
dns
dns firewall
dnsbl
domain
domains
drop
email
emotet
esp
exploits
firewall
free use
gdpr
gmail
godaddy
google docs
google drive
google forms
google groups
government
healthcare
hijack
hijacking
icann
industry
intelligence
iot
ip address
ipv4
ipv6
list hygiene
listbombing
malspam
malware
marketing
mta
pbl
phish
phishing
port 25 blocking
qbot
ransomware
rbl
registrar
removals
reputation
return codes
returncodes
routing
rpz
sbl
security
snowshoe
spam
spamtraps
statistics
support
takedown
tds
threat
threats
trends
trickbot
whois
wordpress
xbl
zen



RSS News Feed
Suspicious network resurrections 2020-11-25 UTC
We believe there is a serious issue relating to the equivalent of 56 “/20” networks, with a corresponding 230k IPv4 addresses.... (>)

How to Halt the Hijackers 2019-03-06 UTC
If you’ve read Network hijacking - the low down, you’ll be fully versed in the varied ways cybercriminals can hijack your network. In this article, we’ll be explaining how to protect against this happening to you, along with a high-level overview as to what you can do if your Internet Protocol (IP) addresses are hijacked.... (>)

Network hijacking - the low down 2019-01-08 UTC
Network hijacking involves the announcing or re-routing of Internet protocol (IP) addresses without authorization from the owner of those addresses. When hijacking is done intentionally, it is usually for some type of nefarious or illegal purpose. The consequences can be far reaching for organizations whose networks are hijacked. There are numerous ways cyber-criminals can ‘hijack’ your network, here’s the lowdown.... (>)

Fighting abuse at the edge 2018-04-09 UTC
Take a look at org charts, international standards, conferences and forums…you will observe there are two tribes; one for the ‘network’ the other for ‘applications’. It’s a distinction that’s embedded in Information Technology with the Network Layer ‘below’ all applications with a dedicated team dealing with connectivity, routers, upstreams and peering, all quite independently from the nature of the data that is flowing. Another team deals with ‘applications’; email, web services, etc., that do their job without having to consider the underlying aspects related to networking.... (>)

Spamhaus Botnet Summary 2016 2017-01-17 UTC
2016 was a busy year for existing and emerging cyber threats. In the past year, Spamhaus researchers issued listings for over 7,000 botnet Command & Control ("C&C") servers on more than 1,100 different networks. These C&C servers enabled and controlled online crime such as credential theft, e-banking fraud, spam and DDoS attacks. They were also used for the retrieval of stolen data. 2016 will also go down in history as the first year that security issues related to the 'Internet-of-Things' not only became mainstream, but turned into a serious enabler of ever larger attacks and a source of many future problems.... (>)

Network Hijacking on the Rise 2016-09-26 UTC
As we discussed in a previous article, allocations of IP addresses (IPv4 addresses) are getting hard to come by, especially for spammers. Because the IP addresses they use quickly get a bad reputation as sources of spam, spammers constantly need fresh IPs that are... (>)

Celebrating The First Birthday Of The Spamhaus BGPf 2013-06-12 UTC
In June 2012, Spamhaus launched the Spamhaus BGP feed (BGPf), a new service designed to protect organizations, network owners and network providers from... (>)

Spamhaus Releases BGP feed (BGPf) and Botnet C&C list (BGPCC) 2012-06-12 UTC
Geneva, 12 June 2012 Today the Spamhaus Project announces the release of a new service -- the Spamhaus BGP feed (BGPf). The BGPf serves three Spamhaus lists by using the Border Gateway Protocol (BGP). It is intended to be used primarily by Internet Service Providers (ISPs), web hosting providers, and network service providers (NSPs) in their routers to drop bad traffic at the edge... (>)

© 1998-2023 The Spamhaus Project SLU. All rights reserved.
Legal  |  Privacy