A new phishing campaign abuses the .arpa TLD to host malicious content and hides its location via Cloudflare’s infrastructure.
A threat actor has found a new way to evade phishing detection defenses: Manipulate the .arpa top-level domain (TLD) and IPv6-to-IPv4 tunneling to host phishing content on domains that shouldn’t ...
Threat actors are abusing the special-use ".arpa" domain and IPv6 reverse DNS in phishing campaigns that more easily evade ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results