Trending stories

This image of a computer chip illustrates Part 5 of our complete domain cybersecurity checklist with EBRAND CTO Anouar Adlani on DNS Zones.
Domain Cybersecurity Checklist Part 5: DNS Zones 

Welcome to Part 5 of our comprehensive domain cybersecurity checklist, where we dive into DNS zone protection! As always, we’re delivering some expert insights and valuable industry experience from EBRAND’s CTO

This image of a castle on the beach in Puerto Rico highlights this post's main topic: ICANN's conference in San Juan.
A Chief Legal Counsel’s Insights from ICANN 79

ICANN governs the vital infrastructure that businesses and consumers depend on every day. Websites, online shops, and email servers all rely on domain names, making ICANN meeting outcomes highly significant for any modern

This image of phish illustrates this article's topic: understanding phishing/fishing domain impersonation tactics.
Top ten impersonation techniques used in phishing domains

Cybercriminals constantly create new tactics to trick their targets, exploiting typographical variations and emerging technologies to build convincing domain impersonations. Familiarising yourself with some common strategies helps you prepare your

Uncover Digital Threats

Get a tailored audit of your digital landscape - fill out the form and connect with an expert today!

EBRAND

Client login

Welcome to the client login portal, where EBRAND users access their solution platforms. Select your solution below:

Not an EBRAND client yet? Sign up
Discover more on our Solutions pages