Blog
Articles, interviews, and useful tips to help you with everything from starting a Premium Anycast DNS project to securing your organization against cyberthreats.
Articles, interviews, and useful tips to help you with everything from starting a Premium Anycast DNS project to securing your organization against cyberthreats.
The internet powers our world - but it also fuels cybercrime. Every day, phishing campaigns, malware, and botnets target businesses and individuals alike. Combating this scale of threat requires constant vigilance, collaboration, and intelligence sharing. At Excedo Networks | Security Operations Center | Digital Crimes Unit (DCU), we are on the frontlines of this battle. Our team operates 24/7/365, detecting and disrupting internet-related crimes in real time. Because when cybercriminals do not rest, neither can we.
From a cloned website to a possible back-end breach in less than a year. EPM faced three waves of attacks that impacted thousands of customers and caused multi-million-dollar losses. Discover the full timeline, the impact, and the lessons every critical infrastructure provider in Latin America needs to learn.
In less than a year, Tiquetes Baratos faced three waves of cyberattacks that began with fake ads on social media and escalated into an advanced persistent threat (APT). This case shows how brand abuse can quickly turn into an operational crisis—and why timely action is no longer optional.
In just 18 months, JetSmart Airlines became the target of phishing campaigns that started with fake ads and escalated into targeted malware attacks. This case reveals how fast digital impersonation can evolve—and why timely action is critical to protect your brand and customers.
LATAM Airlines was targeted by three connected phishing and impersonation campaigns between 2024 and 2025. This case shows how digital fraud can escalate fast—and what brands must do to stay protected.
In just eighteen months, Avianca faced a series of sophisticated phishing campaigns that swiftly evolved from malicious social media ads to targeted attacks by an APT group. This case provides a valuable snapshot of how digital threats can escalate and adapt, testing both customer trust and the operational resilience of a major airline.
As digital payment platforms become the norm, so do sophisticated phishing schemes designed to mimic legitimate services. This case describes how a fraudulent domain targeting users attempting to pay utility bills was identified, mitigated, and removed through coordinated cybersecurity response measures. Thanks to the rapid intervention of Centurio International's technical team, the malicious infrastructure was dismantled before it could cause further damage.
In today’s hyper-connected digital world, every millisecond matters - and so does every moment of downtime. While enterprises invest heavily in application availability, failover systems, and global content delivery, one crucial piece of infrastructure is often overlooked: Recursive DNS (Domain Name System). If your recursive DNS is not robust and resilient, your entire online presence is at risk - even if your servers are flawless. Here is why your business should prioritize a high-availability DNS strategy.
In today’s digital world, email remains one of the most widely used - and most targeted - communication channels. To combat rising threats like phishing, spoofing, and spam, Microsoft Outlook is rolling out new authentication requirements for high-volume senders (defined as those sending over 5,000 messages per day). These changes aim to create a more trustworthy and secure email ecosystem.
As cyber threats evolve, so too must the tools we use to protect against them. One of the most powerful standards in email security - DMARC (Domain-based Message Authentication, Reporting, and Conformance) - is undergoing a major evolution. The proposed update, known as DMARCbis, is a revised version of the original DMARC standard (RFC 7489), currently working its way through the IETF standardization process.
The cybersecurity landscape has undergone a dramatic transformation in recent years, driven by the rapid advancement of artificial intelligence and machine learning technologies. Traditional network security tools such as firewalls and antivirus software, while still important, are increasingly outpaced by sophisticated, AI-powered threats that can adapt and evolve in real-time. To stay safe in this landscape, organisations need advanced threat intelligence capabilities to identify, prevent, and respond to emerging threats before they can cause significant damage. The rise of AI in cybersecurity has created a paradigm shift: while AI empowers attackers to create more sophisticated threats, it also enables defenders to develop more effective threat intelligence systems. This dynamic has made threat intelligence an essential component of modern cybersecurity strategy.
In today's digital landscape, a brand's online presence extends far beyond a single website. Enterprises typically maintain numerous digital touchpoints, including multiple websites, mobile applications, web applications, and APIs that connect numerous services and systems. While this digital ecosystem enables efficient operations and enhanced customer experiences, it also presents an expanded attack surface that cybercriminals actively exploit. The cost of such exploitation can be extremely high. Beyond the immediate financial losses of a successful attack, which averaged $4.35 million per data breach in 2022, organisations can also face long-term reputation damage, loss of customer trust, regulatory penalties, and potential legal liabilities if they do not properly protect themselves.
The NIS2 Directive places new requirements on domain name registrars to get accurate information on registrants in order to minimise the anonymity that enables cybercrime.
BIMI (Brand Indicators for Message Identification) is a way to quickly show email recipients that emails actually originate from your organization. It allows you to add your brand logo to all outgoing emails so recipients can trust that they come from you and not a malicious third party.
Excedo's mission has always been to protect businesses and people online. This requires a holistic approach covering everything from email security and domain management to threat intelligence.
Implementing a DMARC policy for very small organizations is not too complex. Generally, one just needs to ensure it is implemented correctly for a single domain. However, for larger organizations, with multiple domains and email systems, it is much more complicated.
DDoS (Distributed Denial of Service) attacks threaten the availability of essential services and systems worldwide. The first step to protection is to understand what these attacks look like and what vulnerabilities they exploit.
There are many reasons to secure and closely control your digital IP. An important reason is to protect your organization from online brand abuse, where malicious third parties use your brand name to commit fraud.
The default settings of most major email providers have for a long time not been enough to stop email threats from reaching inboxes. But that is now changing with Google and Yahoo's new email security requirements, including the mandatory implementation of DMARC.
Ransomware is one of the most common forms of cyber-attack and targets individuals and businesses around the world.
A DMARC (Domain-based Message Authentication, Reporting, and Conformance) policy is a key part of organizational email security. It prevents email threats from reaching your employees and users, and it is now a requirement by major email providers like Gmail and Yahoo.
Latin America is an economic powerhouse with fast growing economies that are becoming ever more digital and diverse.
Colombia is no stranger to cyberattacks. As one of the fastest growing economies in the LATAM region with a booming tech sector, it has become a common target for cybercriminals.
Address
Medellín
COLOMBIA