by DNSFilter Team on Aug 25, 2022 12:00:00 AM
New research from cybersecurity vendor Akamai has revealed that 12.3% of monitored devices communicated with domains associated with malware or ransomware at least once during the second quarter of 2022. This represented a 3% increase compared to Q1 2022, the firm stated, with phishing toolkits playing a key role in malicious domain-related activity. The findings are based on DNS data and Akamai’s visibility into carrier and enterprise traffic across different industries and geographies.
In a blog post detailing its research, Akamai stated that, in addition to the devices it detected communicating with domains associated with malware/ransomware, a further 6.2% of devices accessed phishing domains with 0.8% accessing command-and-control (C2)-associated domains (both small increases on Q1 2022). “While this number might seem insignificant, the scale here is in the millions of devices,” the firm wrote. “When this is considered, with C2 being the most malignant of threats, this is not only significant, it’s cardinal.”
In a bold move to strengthen its foothold in the cybersecurity sector, DNSFilter recently announced a substantial expansion of its channel partner network. The year 2024 marks a pivotal moment as the company reported a remarkable 40% increase in channel-driven Annual Recurring Revenue (ARR), responding to a heightened demand for robust and efficient DNS protection worldwide.
{% module_block module "widget_288ac331-8c1a-414f-ba25-121bcd1db270" %}{...Better, more robust cybersecurity is not a new need for today's digital organizations; it's a perennial one. What's new are the particular challenges these organizations face due to the advent of AI technologies and hybrid work models, among other changes. Such realities call for not just new tools but new ways of thinking. Securing modern businesses is a matter of staying updated on the latest threats, updating tools and looking at security from...
Fostering Channel Partner Growth Through Major Initiatives