Learning Center

Domain security, threat intelligence, and brand protection

Build a deeper understanding of the techniques, tools, and strategies used to protect organizations from domain-based threats. Whether you are new to domain security or looking to sharpen your knowledge, these guides are designed to help.

Jump in with an essential guide, then explore sections for deeper context on typosquatting, DNS, email security, threat intelligence, and more.

Read your first guide

7 articles

Brand protection

Protecting your brand online requires vigilance across domains, search results, and digital channels. Learn about strategies, tools, and best practices for detecting and responding to brand abuse.

Read more

13 articles

DNS security

The Domain Name System is foundational internet infrastructure and a frequent target for attackers. Learn how DNS works, common DNS-based attacks, and the security mechanisms that protect domain resolution.

Read more

4 articles

Domain protection

Domain protection goes beyond registration to include monitoring, defensive strategies, and ongoing management. Learn how organizations protect their domain portfolios from squatting, hijacking, and abuse.

Read more

12 articles

Email security

Email is both a critical business channel and a top attack vector. Learn how SPF, DKIM, and DMARC establish sender trust, and how phishing, BEC, and related threats exploit gaps in people and process.

Read more

18 articles

Threat intelligence

Threat intelligence helps teams identify, analyze, and respond to threats before they cause damage. Explore domain investigations with WHOIS and RDAP, passive DNS and hosting context, certificate transparency, detection techniques, and analysis methods.

Read more

20 articles

Typosquatting

Typosquatting exploits mistakes and visual similarity to register deceptive domains that impersonate trusted brands. Learn what typosquatting is, permutation techniques from homoglyphs to bitsquatting, detection, and protection strategies.

Read more

Featured topics

Start here

New to domain security? These foundational articles cover the essential concepts.

Brand protection

Brand protection monitoring

Brand protection monitoring is the continuous scanning of digital channels for unauthorized use of a company's brand. This guide covers data sources, alerting strategies, false positive management, and integration with security and legal workflows.

DNS security

DNS records explained

DNS record types define how domain names resolve to addresses, route mail, delegate authority, and verify ownership. This reference covers A, AAAA, CNAME, MX, TXT, NS, SOA, PTR, SRV, and CAA records along with their security implications.

Domain protection

Domain monitoring

Domain monitoring is the practice of tracking new domain registrations, DNS changes, certificate issuance, and web content on domains that could impersonate or attack a brand. This guide covers detection approaches, data sources, the monitoring pipeline, and integration with incident response.

Email security

Business email compromise (BEC)

Business email compromise is a targeted social engineering attack that uses email impersonation and trust exploitation to divert payments, steal sensitive data, or manipulate business processes.

Threat intelligence

Domain threat intelligence

Domain threat intelligence is the collection and analysis of signals from domain registrations, DNS, certificates, and hosting to detect abuse. This guide covers core data sources, enrichment workflows, and how domain threat intelligence supports incident response.

Typosquatting

IDN homograph attacks

IDN homograph attacks exploit visual similarity between characters in different Unicode scripts to create domains that appear identical to legitimate ones. This guide covers the technical mechanism, notable demonstrations, browser and registry defenses, and detection approaches.

Put what you learn into practice

Monitor typosquats, investigate infrastructure, and move from reading to detection with continuous domain coverage built for security teams.