
Permission to quote from or reproduce Spamhaus News articles is granted automatically providing you state the source as Spamhaus and link to the news record.
































































































|
|
 |
2020-04-17 UTC |
Why buy the cow when you can get the milk for free?... (>) |
|
 |
2019-03-06 UTC |
If you’ve read Network hijacking - the low down, you’ll be fully versed in the varied ways cybercriminals can hijack your network. In this article, we’ll be explaining how to protect against this happening to you, along with a high-level overview as to what you can do if your Internet Protocol (IP) addresses are hijacked.... (>) |
|
 |
2019-01-08 UTC |
Network hijacking involves the announcing or re-routing of Internet protocol (IP) addresses without authorization from the owner of those addresses. When hijacking is done intentionally, it is usually for some type of nefarious or illegal purpose. The consequences can be far reaching for organizations whose networks are hijacked. There are numerous ways cyber-criminals can ‘hijack’ your network, here’s the lowdown.... (>) |
|
 |
2018-04-09 UTC |
Take a look at org charts, international standards, conferences and forums…you will observe there are two tribes; one for the ‘network’ the other for ‘applications’. It’s a distinction that’s embedded in Information Technology with the Network Layer ‘below’ all applications with a dedicated team dealing with connectivity, routers, upstreams and peering, all quite independently from the nature of the data that is flowing. Another team deals with ‘applications’; email, web services, etc., that do their job without having to consider the underlying aspects related to networking.... (>) |
|
 |
2016-09-26 UTC |
As we discussed in a previous article, allocations of IP addresses (IPv4 addresses) are getting hard to come by, especially for spammers. Because the IP addresses they use quickly get a bad reputation as sources of spam, spammers constantly need fresh IPs that are... (>) |
|
 |
2016-04-05 UTC |
Starting with 1st June 2016, you can look up an IP address on any Spamhaus zone that supports SBL lookups, and verify whether that IP address is on DROP/eDROP. An IP address that is listed on DROP or eDROP will return 127.0.0.9 in addition to 127.0.0.2.... (>) |
|
 |
2016-02-01 UTC |
Over the past few years, spammers have sought out large ranges of IP addresses. By spreading out their sending patterns across a wide range of IP addresses, they can attempt to defeat spam filters and get spam and malware emails delivered where they are not wanted. However, IPv4 addresses are getting scarce and hard to come by. In fact, as of... (>) |
|
 |
2014-02-26 UTC |
ICANN's Security and Stability Advisory Committee (SSAC) document Advisory on DDoS Attacks Leveraging DNS Infrastructure, published this week, provides a much-needed touchstone for the Internet in its current state. DDoS attacks, such as the one... (>) |
|