Learning Center
Domain security, threat intelligence, and brand protection
Build a deeper understanding of the techniques, tools, and strategies used to protect organizations from domain-based threats. Whether you are new to domain security or looking to sharpen your knowledge, these guides are designed to help.
Jump in with an essential guide, then explore sections for deeper context on typosquatting, DNS, email security, threat intelligence, and more.
Read your first guide7 articles
Brand protection
Protecting your brand online requires vigilance across domains, search results, and digital channels. Learn about strategies, tools, and best practices for detecting and responding to brand abuse.
13 articles
DNS security
The Domain Name System is foundational internet infrastructure and a frequent target for attackers. Learn how DNS works, common DNS-based attacks, and the security mechanisms that protect domain resolution.
4 articles
Domain protection
Domain protection goes beyond registration to include monitoring, defensive strategies, and ongoing management. Learn how organizations protect their domain portfolios from squatting, hijacking, and abuse.
12 articles
Email security
Email is both a critical business channel and a top attack vector. Learn how SPF, DKIM, and DMARC establish sender trust, and how phishing, BEC, and related threats exploit gaps in people and process.
18 articles
Threat intelligence
Threat intelligence helps teams identify, analyze, and respond to threats before they cause damage. Explore domain investigations with WHOIS and RDAP, passive DNS and hosting context, certificate transparency, detection techniques, and analysis methods.
20 articles
Typosquatting
Typosquatting exploits mistakes and visual similarity to register deceptive domains that impersonate trusted brands. Learn what typosquatting is, permutation techniques from homoglyphs to bitsquatting, detection, and protection strategies.
Featured topics
Start here
New to domain security? These foundational articles cover the essential concepts.
Brand protection
Brand protection monitoring
Brand protection monitoring is the continuous scanning of digital channels for unauthorized use of a company's brand. This guide covers data sources, alerting strategies, false positive management, and integration with security and legal workflows.
DNS security
DNS records explained
DNS record types define how domain names resolve to addresses, route mail, delegate authority, and verify ownership. This reference covers A, AAAA, CNAME, MX, TXT, NS, SOA, PTR, SRV, and CAA records along with their security implications.
Domain protection
Domain monitoring
Domain monitoring is the practice of tracking new domain registrations, DNS changes, certificate issuance, and web content on domains that could impersonate or attack a brand. This guide covers detection approaches, data sources, the monitoring pipeline, and integration with incident response.
Email security
Business email compromise (BEC)
Business email compromise is a targeted social engineering attack that uses email impersonation and trust exploitation to divert payments, steal sensitive data, or manipulate business processes.
Threat intelligence
Domain threat intelligence
Domain threat intelligence is the collection and analysis of signals from domain registrations, DNS, certificates, and hosting to detect abuse. This guide covers core data sources, enrichment workflows, and how domain threat intelligence supports incident response.
Typosquatting
IDN homograph attacks
IDN homograph attacks exploit visual similarity between characters in different Unicode scripts to create domains that appear identical to legitimate ones. This guide covers the technical mechanism, notable demonstrations, browser and registry defenses, and detection approaches.
Put what you learn into practice
Monitor typosquats, investigate infrastructure, and move from reading to detection with continuous domain coverage built for security teams.