Instances of domain hijacking are on the increase, and the fall out for victims can be significant.  Join ISC and Matt Sith, from Spamhaus to discover how big a problem domain hijacking is and learn how to protect against it.

Since the start of this year, at one single registrar, Spamhaus has observed an average of 100 hijacked domains a day, read more here.  Miscreants consider legitimate domains, with a good reputation,  a valuable asset.  There are a number of ways bad actors can obtain your domain, from DNS hijacking to sending bogus emails to gain access to an owner’s registry account.  The fall-out from having a domain hijacked can be significant.

The webinar will be covering the following areas:

  • The reality of the issue
  • Real-life examples
  • Providing advice to help mitigate, detect and remediate against domain hijacking.

Watch the webinar.

Related Products

Border Gateway Protocol

Border Gateway Protocol (BGP) Feeds provide your users and network with up to date protection against botnets and other external attacks.

Set up takes minutes; our data is constantly updated in real time by our experienced researchers on your behalf, and can be utilized in your existing BGP capable routers.

  • Prevent data exfiltration
  • Protect your network from botnets
  • Reduce infected machines on your network


Botnet Threat Update Q1 2020

15 April 2020


The number of botnet Command & Controllers (C&Cs) associated with fraudulent sign-ups, reduced by 57% in Q1 2020, however it isn't all good news. Find out the full details on botnet C&C activity here.

The Value of Threat Intelligence – The White Paper (2019)

29 October 2019


In this Osterman Report, over 200 companies were interviewed to find out how they were utilizing threat intelligence data. Compare yourself to the market place, and find out how others are protecting themselves.

Newly registered domains – how to avoid the risks with ZRD

6 December 2016


Spamhaus’ Zero Reputation Domain service protects users from newly-registered domains used by cybercriminals to send spam and drive traffic to harmful websites.