Search results: dns tunneling

monitoring, observability, process monitoring Barracuda Open XDR monitoring DNS threat

How DNS Attack Dynamics Evolved During the Pandemic

The Domain Name System (DNS) is the “Internet’s address book;” the essential, trusted, rarely scrutinized protocol that keeps the internet running by mapping readable domain names to IP addresses. More than 2.2 ...
Security Boulevard
DNS Protection: A "Must" in Security Solutions for any Company

DNS Protection: A "Must" in Security Solutions for any Company

DNS is a critical element for all companies because it turns domain names into internet protocol (IP) addresses. Cyber criminals have been digging into DNS in order to create new threats. DNS ...
DNS: Strengthening the Weakest Link

DNS: Strengthening the Weakest Link

One in three organizations hit by DDoS attacks experienced an attack against their DNS server. Why is DNS such an attractive target? What are the challenges associated with keeping it secure? What ...
Effectively Detecting Low Throughput and Malicious DNS Exfiltration

Effectively Detecting Low Throughput and Malicious DNS Exfiltration

|
In a previous blog post, we described how the DNS protocol, mainly designed for hostname to IP addresses resolution, can be abused for arbitrary data exchange. Based on throughput (i.e., bytes per ...

Malvertising campaign targeting IT teams with MadMxShell

|
IntroductionBeginning in March of 2024, Zscaler ThreatLabz observed a threat actor weaponizing a cluster of domains masquerading as legitimate IP scanner software sites to distribute a previously unseen backdoor. The threat actor ...
OT, Not IoT: The Foundation of Network Security

OT, Not IoT: The Foundation of Network Security

| | Blog
Operational technology (OT) is critical infrastructure that enables IT networks to function. OT management relies on both open and closed protocols — both threat actors and OT professionals must pick one protocol ...
HYAS Protection for growing businesses

HYAS Protection for growing businesses

| | Blog
Securing SMB Success: The Indispensable Role of Protective DNS Cyber attacks pose as much risk to small and medium-sized businesses (SMBs) as they do to large organizations — if not more. Implementing ...
Defeating Malvertising-Based Phishing Attacks

Defeating Malvertising-Based Phishing Attacks

| | Blog, HYAS Labs, Phishing
Malvertising Enters a New Age While Google grapples with the potential threat that ChatGPT poses to its advertising business, cybercriminals are taking advantage of Google Ads to ramp up their phishing attacks ...
Why Small and Medium Sized Businesses Need More Than Just an AntiVirus Solution

Why Small and Medium Sized Businesses Need More Than Just an AntiVirus Solution

| | Blog, pDNS
As the size and scope of cybercriminal activity continues to grow, small and medium-sized businesses (SMBs) are increasingly becoming the target of cyberattacks. In 2023, small businesses experienced a 424-percent increase in ...
Modern Digital Infrastructure

The Log4j Exploit and Botnets

| | Cyber Security
Of all the security issues that have appeared over the last few years, none has had the impact of the Log4j exploit. Also called the Log4Shell, it was reported to the developers, ...