Blog

Articles, interviews, and useful tips to help you with everything from starting a Premium Anycast DNS project to securing your organization against cyberthreats.

Invalid Input
Image
Phishing Campaign Case Study: LATAM Airlines (2024 – 2025)

LATAM Airlines was targeted by three connected phishing and impersonation campaigns between 2024 and 2025. This case shows how digital fraud can escalate fast—and what brands must do to stay protected.

Phishing Campaign Case Study: Avianca Airlines (2024 - 2025)

In just eighteen months, Avianca faced a series of sophisticated phishing campaigns that swiftly evolved from malicious social media ads to targeted attacks by an APT group. This case provides a valuable snapshot of how digital threats can escalate and adapt, testing both customer trust and the operational resilience of a major airline.

Phishing Domain Takedown: How a Fraudulent Utility Payment Site Was Neutralized

As digital payment platforms become the norm, so do sophisticated phishing schemes designed to mimic legitimate services. This case describes how a fraudulent domain targeting users attempting to pay utility bills was identified, mitigated, and removed through coordinated cybersecurity response measures. Thanks to the rapid intervention of Centurio International's technical team, the malicious infrastructure was dismantled before it could cause further damage.

Why a Robust and Resilient Recursive DNS Is Critical for 100% Uptime

In today’s hyper-connected digital world, every millisecond matters - and so does every moment of downtime. While enterprises invest heavily in application availability, failover systems, and global content delivery, one crucial piece of infrastructure is often overlooked: Recursive DNS (Domain Name System). If your recursive DNS is not robust and resilient, your entire online presence is at risk - even if your servers are flawless. Here is why your business should prioritize a high-availability DNS strategy.

Strengthening the Email Ecosystem: Outlook’s New Requirements for High-Volume Senders

In today’s digital world, email remains one of the most widely used - and most targeted - communication channels. To combat rising threats like phishing, spoofing, and spam, Microsoft Outlook is rolling out new authentication requirements for high-volume senders (defined as those sending over 5,000 messages per day). These changes aim to create a more trustworthy and secure email ecosystem.

DMARCbis: The Future of Email Authentication — What You Need to Know

As cyber threats evolve, so too must the tools we use to protect against them. One of the most powerful standards in email security - DMARC (Domain-based Message Authentication, Reporting, and Conformance) - is undergoing a major evolution. The proposed update, known as DMARCbis, is a revised version of the original DMARC standard (RFC 7489), currently working its way through the IETF standardization process.

The Evolution of Network Security: Why Traditional Tools Aren't Enough Without Threat Intelligence

The cybersecurity landscape has undergone a dramatic transformation in recent years, driven by the rapid advancement of artificial intelligence and machine learning technologies. Traditional network security tools such as firewalls and antivirus software, while still important, are increasingly outpaced by sophisticated, AI-powered threats that can adapt and evolve in real-time. To stay safe in this landscape, organisations need advanced threat intelligence capabilities to identify, prevent, and respond to emerging threats before they can cause significant damage. The rise of AI in cybersecurity has created a paradigm shift: while AI empowers attackers to create more sophisticated threats, it also enables defenders to develop more effective threat intelligence systems. This dynamic has made threat intelligence an essential component of modern cybersecurity strategy.

Enterprise Guide to protecting Websites, Applications and APIs from threats

In today's digital landscape, a brand's online presence extends far beyond a single website. Enterprises typically maintain numerous digital touchpoints, including multiple websites, mobile applications, web applications, and APIs that connect numerous services and systems. While this digital ecosystem enables efficient operations and enhanced customer experiences, it also presents an expanded attack surface that cybercriminals actively exploit. The cost of such exploitation can be extremely high. Beyond the immediate financial losses of a successful attack, which averaged $4.35 million per data breach in 2022, organisations can also face long-term reputation damage, loss of customer trust, regulatory penalties, and potential legal liabilities if they do not properly protect themselves.

Navigating NIS2 and Article 28: The Importance of KYC for Domain Name Registrants

The NIS2 Directive places new requirements on domain name registrars to get accurate information on registrants in order to minimise the anonymity that enables cybercrime.

What is BIMI and why it's important for your brand

BIMI (Brand Indicators for Message Identification) is a way to quickly show email recipients that emails actually originate from your organization. It allows you to add your brand logo to all outgoing emails so recipients can trust that they come from you and not a malicious third party. 

Making the Internet a Safer Place for Businesses and People

Excedo's mission has always been to protect businesses and people online. This requires a holistic approach covering everything from email security and domain management to threat intelligence.

Why implementing DMARC for all your domains matters

Implementing a DMARC policy for very small organizations is not too complex. Generally, one just needs to ensure it is implemented correctly for a single domain. However, for larger organizations, with multiple domains and email systems, it is much more complicated.

What is a DDoS Attack?

DDoS (Distributed Denial of Service) attacks threaten the availability of essential services and systems worldwide. The first step to protection is to understand what these attacks look like and what vulnerabilities they exploit.

What is cybersquatting and how to protect yourself from it

There are many reasons to secure and closely control your digital IP. An important reason is to protect your organization from online brand abuse, where malicious third parties use your brand name to commit fraud.

Making the Internet Safer: Google and Yahoo enhance Email Security

The default settings of most major email providers have for a long time not been enough to stop email threats from reaching inboxes. But that is now changing with Google and Yahoo's new email security requirements, including the mandatory implementation of DMARC.

How to protect your organisation from ransomware

Ransomware is one of the most common forms of cyber-attack and targets individuals and businesses around the world.

What is DMARC and why you need it to keep your emails safe

A DMARC (Domain-based Message Authentication, Reporting, and Conformance) policy is a key part of organizational email security. It prevents email threats from reaching your employees and users, and it is now a requirement by major email providers like Gmail and Yahoo.

The state of cybersecurity in LATAM

Latin America is an economic powerhouse with fast growing economies that are becoming ever more digital and diverse.

Lessons from massive ransomware attack on IFX Networks in Colombia

Colombia is no stranger to cyberattacks. As one of the fastest growing economies in the LATAM region with a booming tech sector, it has become a common target for cybercriminals.

Keep up with the latest news and articles from Centurio International
on LinkedIn

Select your language

Contact us
Whatsapp próximamente
First name is required
Email is required
Company name is required
Last name is required
Invalid Input
Invalid Input
You have to select an option
Please write your message.
*
You have to agree
Company name is required
First name is required
Email is required
Last name is required
Invalid Input
This is a required field
Please write your message.
*
Tienes que estar de acuerdo