Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Zero-day vulnerability in SaaS services exploited to launch IDN Homograph-like a
- This topic has 0 replies, 1 voice, and was last updated 1 year, 2 months ago by .
Cybercriminals are exploiting a zero-day vulnerability in Verisign and several SaaS services to register malicious generic top-level domains and subdomains that look the same as legitimate sites. The impacted SaaS services include Google, Amazon, and DigitalOcean. The purpose behind this is to launch phishing attacks against organizations.
You must be logged in to reply to this topic.