Malicious domains are commonly used by cyberattackers for command and control communication, hosting malware and phishing attacks. Palo Alto Networks researchers Wei Xu, Kyle Sanders and Yanxin Zhang recently explored ways to predict malicious domains so they can be added to blacklists before they go live. To hear how they went about this, and to see the results they achieved, take a look at this video from their paper presentation at VB2014:
Related Vulnerabilities Resources
![A pictorial representation of BOLA vulnerabilities found in Easy!Appointments. A person's hands type on a laptop. Superimposed graphically before the screen is code appearing in three separate streams by color, before joining together in many lines.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/07/07_Security-Technology_Category_1920x900-786x368.jpg)
![Abstract illustration of a network sppread like a spiderweb, connecting covering the globe and symbolizing data or communication links.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/03_Vulnerabilities_1920x900-786x368.jpg)
![A digital illustration of a world map focused on Europe and parts of Asia, highlighted with glowing connections and nodes representing global connectivity.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/07_Nation-State-cyberattacks_1920x900-786x368.jpg)
![Close-up side profile of a Black woman wearing glasses, focused intently on something out of frame.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/05_Vulnerabilities_1920x900-786x368.jpg)
![A cityscape with many highrises at night. From the ground, beacons of light point upward and end in glowing dots.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/07_Vulnerabilities_1920x900-786x368.jpg)
![Abstract illustration of a digital network connecting various points on a map of the United States, symbolizing data or communication links.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/06_Vulnerabilities_1920x900-786x368.jpg)
![A glowing red wifi symbol across a textured black background.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/04_Vulnerabilities_1920x900-786x368.jpg)
![Person in a blurred motion is working on a computer with screen showing lines of code, emphasizing a dynamic and intense focus on software development or programming in a dimly lit room.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/06_Malware_Category_1920x900-786x368.jpg)