Search results: dns tunneling

vulnerability PixieFail network bug

Don’t Get ‘Shawshanked’ by DNS Tunneling 

Since the onset of the pandemic, cyberattackers have increasingly looked to leverage DNS channels to steal data, launch DDoS attacks and deploy malware—and the cost of these attacks is rising. According to ...
Security Boulevard

SolarWinds/SUNBURST: DGA or DNS Tunneling?

As we continue unpacking and analyzing the SolarWinds attack, which FireEye has described as a “highly evasive” Domain Generation Algorithm (DGA) incident, we first need to agree on terminology before we can ...
What Is Dynamic DNS

What Is Dynamic DNS

|
Delving into the Multiple Aspects of the Dynamic Domain Name Protocol (DDNS): A Detailed Scrutiny DDNS, standing for Dynamic Domain Name System, is an automatic procedure crafted to maintain the synchronization of ...
The Differences Between DNS Protection and Protective DNS

The Differences Between DNS Protection and Protective DNS

| | Blog
DNS Protection, Protective DNS and DNS Security … What’s the Difference? In the ever-evolving landscape of cybersecurity, staying ahead of threats is paramount. Two terms that often surface in discussions about online ...
ZeroQlik: Achieving Unauthenticated Remote Code Execution via HTTP Request Tunneling and Path Traversal

ZeroQlik: Achieving Unauthenticated Remote Code Execution via HTTP Request Tunneling and Path Traversal

Overview In an effort to safeguard our customers, we perform proactive vulnerability research with the goal of identifying zero-day vulnerabilities that are likely to impact the security of leading organizations.  Recently, we ...
DNS Security and SASE: Extending Security and Zero Trust to the New Network Perimeter

DNS Security and SASE: Extending Security and Zero Trust to the New Network Perimeter

DNS stands for Domain Name System, and acts as the “phone book of the internet”, turning IP addresses, such as 157.240.22.35 into Fully Qualified Domain Names (or FQDNs), such as Facebook.com ...
DNS-Based Threats and Their Impact on Business

DNS-Based Threats and Their Impact on Business

By Kerry McQuarrie, SOC Manager, CISO Global, Inc. A Domain Name System (DNS) is a protocol that translates human-readable domain names/URLs—like favoritewebsite.com—into IP addresses that computers can read—like 135.24.56.98. DNS servers handle ...
monitoring, observability, process monitoring Barracuda Open XDR monitoring DNS threat

Costly DNS Attacks on the Rise

While awareness of DNS security continues to grow, the cost, frequency and number of attacks remain high, while the pandemic and resulting hybrid work environments have resulted in huge disruption for organizations ...
Security Boulevard
SolarWinds Hack and the Case of DNS Security

SolarWinds Hack and the Case of DNS Security

It's not news that some of the top government agencies and companies in the world were victims of the SolarWinds attack. At this point, I can say it's the reason I didn't ...
DNS Security, A Never-Ending Story

DNS Security, A Never-Ending Story

Attackers have developed techniques that exploit the DNS’ infrastructure weaknesses. But what makes DNS such an attractive attack vector? The post DNS Security, A Never-Ending Story appeared first on Radware Blog ...