Domain Search: Checking Suspicious Domains Using CIP Domain Search

From the past, attackers have long been employing malicious methods to set up phishing sites disguising as famous sites and steal personal financial information via emails, SMS and online community boards. According to Verizon's '21 Data Breach Investigation Report’, it was found that 36% of breaches were associated with phishing, which is an indicator of [...]

By |2022-08-04T16:22:18+09:00March 4th, 2022|Tags: , , |0 Comments

Searching for VPN IP Exposure Through Criminal IP and Recommendations for Protective Measures

With remote work being on the rise due to COVID-19, more and more companies are using VPN, which in turn is leading to a spike in attacks that exploit the vulnerabilities found in VPN. Some classic examples include the Korea Atomic Energy Research Institute and the Korea Aerospace Industry in Korea where attackers were all [...]

By |2022-08-04T16:21:42+09:00February 25th, 2022|Tags: , , , , |0 Comments
Go to Top