ESX Virtualization

VMware ESXi, vSphere, VMware Backup, Hyper-V... how-to, videos....

Nakivo Backup and Replication - #1 Backup solution for Virtual, physical, cloud, NAS and SaaS

Menu
  • Certification
      • VCP-DCV vSphere 8
          • vcp2024-125.
        • Close
    • Close
  • VMware
    • Configuration Maximums
    • vSphere
      • VVF 9 and VCF 9
      • vSphere 8.0
      • vSphere 7.0
      • vSphere 6.7
      • vSphere 6.5
      • vSphere 6.0
      • Close
    • VMworld
      • VMware EXPLORE 2024
      • VMware EXPLORE 2023
      • VMware EXPLORE 2022
      • VMworld 2019
      • VMworld 2018
      • VMworld 2017
      • VMworld 2016
      • VMworld 2015
      • VMworld 2014
      • VMworld 2013
      • VMworld 2012
      • VMworld 2011
      • Close
    • Close
  • Microsoft
    • Windows Server 2012
    • Windows Server 2016
    • Windows Server 2019
    • Windows Server 2025
    • Close
  • Categories
    • Tips – VMware, Microsoft and General IT tips and definitions, What is this?, How this works?
    • Server Virtualization – VMware ESXi, ESXi Free Hypervizor, VMware vSphere Server Virtualization, VMware Cloud and Datacenter Virtualization
    • Backup – Virtualization Backup Solutions, VMware vSphere Backup and ESXi backup solutions.
    • Desktop Virtualization – Desktop Virtualization, VMware Workstation, VMware Fusion, VMware Horizon View, tips and tutorials
    • How To – ESXi Tutorials, IT and virtualization tutorials, VMware ESXi 4.x, ESXi 5.x and VMware vSphere. VMware Workstation and other IT tutorials.
    • Free – Free virtualization utilities, ESXi Free, Monitoring and free backup utilities for ESXi and Hyper-V. Free IT tools.
    • Videos – VMware Virtualization Videos, VMware ESXi Videos, ESXi 4.x, ESXi 5.x tips and videos.
    • Home Lab
    • Reviews – Virtualization Software and reviews, Disaster and backup recovery software reviews. Virtual infrastructure monitoring software review.
    • Close
  • Partners
    • NAKIVO
    • StarWind
    • Zerto
    • Xorux
    • Close
  • This Web
    • News
    • ESXi Lab
    • About
    • Advertise
    • Archives
    • Disclaimer
    • PDFs and Books
    • Close
  • Free
  • Privacy policy

External threat protection and cybersecurity intelligence

By Vladan SEGET | Last Updated: March 15, 2021

Shares

With the growth of cyber threats all over the globe, many enterprises, service providers and IT admins are looking for a solution to be alerted, be protected or better, actively suppress potential threats. Today we’ll talk about cybersecurity and services allowing to detect and fight cyberthreats, phishing and fraud or impersonating.

Many people imagine that malware, viruses and other cyberthreats and cyberattacks are just the one main side of the cyberthreats and the others are less important. Well, impersonating, scams and organized crime that uses mirrored sites of an original (legal) website, are also a kind of cybersecurity risk.

How does a phishing attack work?

Basically, hacker’s setup up phishing domains, e.g. my-paypal.co and then try to lure customers into giving up their bank login details. The real legit website is a victim. They then sell this information to shady operators on the Dark Web – this can also be known as a “data leak”.

What is Domain Name Monitoring?

One way to steal data is to use a technique called phishing, where cybercriminals use fake (or spoofed) domain names in email phishing attacks to get a hold of your login credentials. There are so many domains being registered and activated each day over thousands of different TLD’s that its almost impossible to track if your brand has been implicated in.

In this example, one company called IntSights can help. They get alerts about new domains with brand mentions and can automatically take actions that shut the malicious domain down for you.

This is just an example with banking details. There are many more indeed and I can even add my own example. Their dark web monitoring services go as far as tracking email campaigns with phishing material in it.

IntSights Threat Intelligence Platform (TIP)

It is a cloud-based platform so no local installation is necessary at your end. The platform is able to centralize and organize the treat sources into one easy dashboard. IntSights has an in-house automated remediation service that helps customers to take down malicious content published on the web.

They’re able to track not only fake websites, but also mobile applications, fraudulent social media pages or pages that contain sensitive data with a possible attack intention.

Identify compromised credentials – possibility to instantly identify and lock down credential leaks by using a leaked credentials database. The system monitors the dark web and when found, with a built-in custom policies, triggers custom reset notification.

The User interface showing an overview different vulnerabilities and their sources.

Other tracking features:

  • Files or malicious items which were used to attack a customer, like leaked login credentials, credit card information, or other private database information.
  • Domain name monitoring – this can be an example of a registered malicious website that uses very similar domain name (ex. cocacola.com vs colacola.com).
  • Domains that were involved in phishing campaigns against IntSight’s customers or their customers.
  • Track code and file sharing sites where they monitor possible exploits, sensitive data or leaked credentials. When matched they initiate a removal request for you.
  • IOC Enrichment helps inform you about possible cyber-attacks, network breaches, and malware infections

 

IntSights works hand in hand with many sources such as social media, app stores, domain registrars, paste sites (Pastebin, Ghostbin), code sites (GitHub), web hosting providers and more.

How do they achieve this?

It is an automatic process with manual interventions here and there. For example, the contact of the website owner or domain registrar to have the webpage shut down or suspend is automatic after the detection.

The system then provides them the details of the attack and suspicious content.

For social media fake pages, they first identify the fake which must be really identical to the original (same logo, industry, etc).

The remediation team from IntSights monitors the automatic process and makes manual intervention when needed once there is a reply from a service provider, a web hosting company or so.

Final Words

From my own personal experience, I can tell that I have had a similar experience with my ESX Virtualization blog 5-8 years ago. Someone made a mirror copy with a different domain extension and tried “just” to make some money by placing affiliate links into the text of all my posts, to sell IT products etc. Each time I published a new article the cyber-criminal had his/her site updated (probably automatically via script).

My SEO went down, and my web traffic as well. Google found duplicated content on the internet and hit me with bad SERP results. I had a hard time letting them take that site down and explain that it’s not me who created duplicated content. As you can see, even such a small entity like mine can find benefit from the new services that exist around today and you might not be aware of.

IntSights was founded in 2015 by former members of an elite intelligence unit in the Israel Defense Forces. Today, IntSights is trusted by many of the world’s largest companies to detect, analyze, and neutralize cyber threats across the clear, deep, and dark web. BTW, recently they helped Europol to shut down the largest dark web marketplace in Europe.

 

More posts from ESX Virtualization:

  • vSphere 7.0 U2 Released
  • vSphere 7.0 Download Now Available
  • vSphere 7.0 Page [All details about vSphere and related products here]
  • VMware vSphere 7.0 Announced – vCenter Server Details
  • VMware vSphere 7.0 DRS Improvements – What's New
  • How to Patch vCenter Server Appliance (VCSA) – [Guide]
  • What is The Difference between VMware vSphere, ESXi and vCenter
  • How to Configure VMware High Availability (HA) Cluster

Stay tuned through RSS, and social media channels (Twitter, FB, YouTube)

Shares
5/5 - (1 vote)

| Filed Under: Server Virtualization Tagged With: cybersecurity intelligence

About Vladan SEGET

This website is maintained by Vladan SEGET. Vladan is as an Independent consultant, professional blogger, vExpert x16, Veeam Vanguard x9, VCAP-DCA/DCD, ESX Virtualization site has started as a simple bookmarking site, but quickly found a large following of readers and subscribers.

Connect on: Facebook. Feel free to network via Twitter @vladan.

Private Sponsors

Featured

  • Thinking about HCI? G2, an independent tech solutions peer review platform, has published its Winter 2023 Reports on Hyperconverged Infrastructure (HCI) Solutions.
  • Zerto: One Platform for Disaster Recovery, Backup & Cloud Mobility: Try FREE Hands-On Labs Today!
Click to Become a Sponsor

Most Recent

  • Dream Lab with PCIe Gen 5.0 M.2 NVMe Storage
  • Backup solution that supports 15+ Hypervisors – Vinchin Backup and Recovery
  • Why NordVPN is Your Must-Have for Business Security and Personal Freedom
  • Agentless Backup Solutions for XCP-ng Hypervisor: External Vendor Options
  • Vinchin Earns Acclaimed Recognition in Gartner Peer Insights 2025 Report
  • VMware vSphere 9 Standard and Enterprise Plus – Not Anymore?
  • Free Virtual Backup Appliance from StarWind – With Community Support (example configuration for ESXi and Veeam Backup)
  • VMware vSphere Foundation (VVF 9) and VMware Cloud Foundation (VCF 9) Has been Released
  • Veeam Backup & Replication 12.3.2 – patch critical vulnerabilities for your dataprotection environments
  • Veeam confirming vSphere 9.0 and ESXi 9 upcoming support

Get new posts by email:

 

 

 

 

Support us on Ko-Fi

 

 

Buy Me a Coffee at ko-fi.com

Free Trials

  • DC Scope for VMware vSphere – optimization, capacity planning, and cost management. Download FREE Trial Here.
  • Augmented Inline Deduplication, Altaro VM Backup v9 For #VMware and #Hyper-V – Grab your copy now download TRIAL.

VMware Engineer Jobs

VMware Engineer Jobs

YouTube

…

Find us on Facebook

ESX Virtualization

…

Copyright © 2025 ·Dynamik-Gen · Genesis Framework · Hosted with HostColor.com