Get to Know DomainTools PhishEye

Presented by

Tim Helming

About this talk

Phishing and other cybercrime campaigns often use deceptive domain names to accomplish their nefarious goals. These look alike domains can allow criminals to pose as employees or partners by spoofing email addresses, or to create deceptive links for the victim to click on. Phishing is the most often-used vector in successful data breaches; it targets an organization’s employees, its customers, or the world at large, with alarming effectiveness. Fake website and phishing scams cost the average-sized organization nearly $4 million annually. Prevention is key and starts with monitoring the Internet for “phishy” domain name registrations. Prior to the release of PhishEye, phishing domain searching was typically available only via custom tools built by security teams themselves. PhishEye automates this painful manual process by showing you existing and new domains that spoof legitimate brand, product, organization, or other names, so that you can carry out defensive or investigative actions against them. You will learn: -How to move from reactive to proactive, by identifying dangerous domains before they cause harm -Ways to disrupt spearphishing, such as business email compromise attacks, by blocking look-alike domains before the attacker uses them -Strategies to mitigate or prevent brand damage caused by illegitimate domains

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (7)
Subscribers (640)
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network, including domains and IPs, and connect them with nearly every active domain on the Internet. Those connections inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work. Learn more about how to connect the dots on malicious activity at or follow us on Twitter:@domaintools