Category: Research
Initially, this post was intended to be a routine review of how cyber threat actors utilize domain names and DNS infrastructure, how these uses evolve, and how cyber threat analysts can use DNS intelligence to…
The Spamhaus DROP list – “DROP (Don’t Route Or Peer) and EDROP are advisory “drop all traffic” lists, consisting of stolen ‘hijacked’ netblocks and netblocks controlled entirely by criminals and professional spammers.” Basically, the DROP…