Search results: dns tunneling

SolarWinds/SUNBURST: DGA or DNS Tunneling?

As we continue unpacking and analyzing the SolarWinds attack, which FireEye has described as a “highly evasive” Domain Generation Algorithm (DGA) incident, we first need to agree on terminology before we can ...
What Is Dynamic DNS

What Is Dynamic DNS

|
Delving into the Multiple Aspects of the Dynamic Domain Name Protocol (DDNS): A Detailed Scrutiny DDNS, standing for Dynamic Domain Name System, is an automatic procedure crafted to maintain the synchronization of ...
The Differences Between DNS Protection and Protective DNS

The Differences Between DNS Protection and Protective DNS

| | Blog
DNS Protection, Protective DNS and DNS Security … What’s the Difference? In the ever-evolving landscape of cybersecurity, staying ahead of threats is paramount. Two terms that often surface in discussions about online ...
ZeroQlik: Achieving Unauthenticated Remote Code Execution via HTTP Request Tunneling and Path Traversal

ZeroQlik: Achieving Unauthenticated Remote Code Execution via HTTP Request Tunneling and Path Traversal

Overview In an effort to safeguard our customers, we perform proactive vulnerability research with the goal of identifying zero-day vulnerabilities that are likely to impact the security of leading organizations.  Recently, we ...
DNS Security and SASE: Extending Security and Zero Trust to the New Network Perimeter

DNS Security and SASE: Extending Security and Zero Trust to the New Network Perimeter

DNS stands for Domain Name System, and acts as the “phone book of the internet”, turning IP addresses, such as 157.240.22.35 into Fully Qualified Domain Names (or FQDNs), such as Facebook.com ...
DNS-Based Threats and Their Impact on Business

DNS-Based Threats and Their Impact on Business

By Kerry McQuarrie, SOC Manager, CISO Global, Inc. A Domain Name System (DNS) is a protocol that translates human-readable domain names/URLs—like favoritewebsite.com—into IP addresses that computers can read—like 135.24.56.98. DNS servers handle ...
SolarWinds Hack and the Case of DNS Security

SolarWinds Hack and the Case of DNS Security

It's not news that some of the top government agencies and companies in the world were victims of the SolarWinds attack. At this point, I can say it's the reason I didn't ...
DNS Security, A Never-Ending Story

DNS Security, A Never-Ending Story

Attackers have developed techniques that exploit the DNS’ infrastructure weaknesses. But what makes DNS such an attractive attack vector? The post DNS Security, A Never-Ending Story appeared first on Radware Blog ...
DNS Protection: A "Must" in Security Solutions for any Company

DNS Protection: A "Must" in Security Solutions for any Company

DNS is a critical element for all companies because it turns domain names into internet protocol (IP) addresses. Cyber criminals have been digging into DNS in order to create new threats. DNS ...
DNS: Strengthening the Weakest Link

DNS: Strengthening the Weakest Link

One in three organizations hit by DDoS attacks experienced an attack against their DNS server. Why is DNS such an attractive target? What are the challenges associated with keeping it secure? What ...

Secure Guardrails