Subscribe to RSS News Feed
About Spamhaus  |  Press Office  |  FAQs   
Spamhaus News Category: firewall
Spamhaus News Quotes

Permission to quote from or reproduce Spamhaus News articles is granted automatically providing you state the source as Spamhaus and link to the news record.


Categories

all categories
abuse
arin
asn
attack
aws
best practices
bgp
blocklist
botnet
botnets
bounce management
breach
bulk domain registration
bulletproof hosting
cbl
cloud
coi
compromise
compromised
confirmed opt in
css
cybercrime
data hygiene
datasets
dbl
ddos
deliverability
dns
dns firewall
dnsbl
domain
domains
drop
email
emotet
esp
exploits
firewall
free use
gdpr
gmail
godaddy
google docs
google drive
google forms
google groups
government
healthcare
hijack
hijacking
icann
industry
intelligence
iot
ip address
ipv4
ipv6
list hygiene
listbombing
malspam
malware
marketing
mta
pbl
phish
phishing
port 25 blocking
qbot
ransomware
rbl
registrar
removals
reputation
return codes
returncodes
routing
rpz
sbl
security
snowshoe
spam
spamtraps
statistics
support
takedown
tds
threat
threats
trends
trickbot
whois
wordpress
xbl
zen



RSS News Feed
It was the best of times, it was the worst of times 2020-04-07 UTC
Calamity always magnifies the light and darkness in people. We see countless... (>)

Spamhaus Releases BGP feed (BGPf) and Botnet C&C list (BGPCC) 2012-06-12 UTC
Geneva, 12 June 2012 Today the Spamhaus Project announces the release of a new service -- the Spamhaus BGP feed (BGPf). The BGPf serves three Spamhaus lists by using the Border Gateway Protocol (BGP). It is intended to be used primarily by Internet Service Providers (ISPs), web hosting providers, and network service providers (NSPs) in their routers to drop bad traffic at the edge... (>)

Spamhaus' DBL as a Response Policy Zone (RPZ) 2011-06-10 UTC
All too frequently electronic security breaches result from some form of social engineering trick which entices a user to visit a harmful website by providing a clickable link (URL) with a specially-registered domain which ultimately leads to the user being defrauded or their machine being infected with malware. Once infected, criminals very quickly gain complete control of that user's... (>)

© 1998-2023 The Spamhaus Project SLU. All rights reserved.
Legal  |  Privacy