DNS

Safeguarding the DNS through registries

Safeguarding the DNS through registries 2024-11-20 at 07:16 By Help Net Security The integrity of our online ecosystem heavily relies on domain registries, which serve as the foundation for secure and trusted digital experiences. However, threats like Domain Name System (DNS) abuse– manifesting as phishing, malware, and botnets – jeopardize this security. Such abuses harm […]

React to this headline:

Loading spinner

Safeguarding the DNS through registries Read More »

Cybercriminals hijack DNS to build stealth attack networks

Cybercriminals hijack DNS to build stealth attack networks 2024-11-15 at 16:05 By Help Net Security Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks and the risk to organizations are

React to this headline:

Loading spinner

Cybercriminals hijack DNS to build stealth attack networks Read More »

Chinese Hackers Deliver Malware via ISP-Level DNS Poisoning

Chinese Hackers Deliver Malware via ISP-Level DNS Poisoning 2024-08-05 at 16:47 By Eduard Kovacs Chinese group StormBamboo spotted delivering Windows and macOS malware by compromising an ISP and using DNS poisoning. The post Chinese Hackers Deliver Malware via ISP-Level DNS Poisoning appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Chinese Hackers Deliver Malware via ISP-Level DNS Poisoning Read More »

Chinese hackers compromised an ISP to deliver malicious software updates

Chinese hackers compromised an ISP to deliver malicious software updates 2024-08-05 at 13:46 By Zeljka Zorz APT StormBamboo compromised a undisclosed internet service provider (ISP) to poison DNS queries and thus deliver malware to target organizations, Volexity researchers have shared. Malware delivery via automatic software updates StormBamboo (aka Evasive Panda, aka StormCloud), a Chinese-speaking threat

React to this headline:

Loading spinner

Chinese hackers compromised an ISP to deliver malicious software updates Read More »

Over 35k Domains Hijacked in ‘Sitting Ducks’ Attacks

Over 35k Domains Hijacked in ‘Sitting Ducks’ Attacks 2024-08-02 at 12:01 By Ionut Arghire Threat actors have hijacked over 35,000 domains in five years because DNS providers fail to properly verify domain ownership. The post Over 35k Domains Hijacked in ‘Sitting Ducks’ Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Over 35k Domains Hijacked in ‘Sitting Ducks’ Attacks Read More »

BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements

BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements 2024-07-25 at 10:01 By Help Net Security BIND (Berkeley Internet Name Domain) is an open-source DNS software system with an authoritative server, a recursive resolver, and related utilities. BIND 9.20, a stable branch suitable for production use, has been released. According to the current software release

React to this headline:

Loading spinner

BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements Read More »

Hackers Exploit Flaw in Squarespace Migration to Hijack Domains

Hackers Exploit Flaw in Squarespace Migration to Hijack Domains 2024-07-16 at 15:02 By Ionut Arghire Hackers exploited a flaw to hijack cryptocurrency domains that were migrated from Google Domains to Squarespace. The post Hackers Exploit Flaw in Squarespace Migration to Hijack Domains appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Hackers Exploit Flaw in Squarespace Migration to Hijack Domains Read More »

Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks

Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks 2024-05-14 at 15:31 By Ionut Arghire Threat actors are using DNS tunneling to track victims’ interaction with spam and to scan network infrastructures. The post Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks Read More »

Ethereum Name Service founder reveals Vitalik Buterin’s fateful grant intervention

Ethereum Name Service founder reveals Vitalik Buterin’s fateful grant intervention 2024-03-19 at 13:01 By Cointelegraph by Gareth Jenkinson Ethereum co-founder Vitalik Buterin played a pivotal role in making the development of the Ethereum Naming Service possible. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Ethereum Name Service founder reveals Vitalik Buterin’s fateful grant intervention Read More »

KeyTrap DNS Attack Could Disable Large Parts of Internet: Researchers

KeyTrap DNS Attack Could Disable Large Parts of Internet: Researchers 2024-02-14 at 15:01 By Eduard Kovacs Patches released for a new DNSSEC vulnerability named KeyTrap, described as the worst DNS attack ever discovered.   The post KeyTrap DNS Attack Could Disable Large Parts of Internet: Researchers appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

KeyTrap DNS Attack Could Disable Large Parts of Internet: Researchers Read More »

PolarDNS: Open-source DNS server tailored for security evaluations

PolarDNS: Open-source DNS server tailored for security evaluations 21/11/2023 at 08:36 By Mirko Zorz PolarDNS is a specialized authoritative DNS server that allows the operator to produce custom DNS responses suitable for DNS protocol testing purposes. What can you do with PolarDNS? PolarDNS can be used for testing of: DNS resolvers (server-side) DNS clients DNS

React to this headline:

Loading spinner

PolarDNS: Open-source DNS server tailored for security evaluations Read More »

The 3 key stages of ransomware attacks and useful indicators of compromise

The 3 key stages of ransomware attacks and useful indicators of compromise 08/11/2023 at 09:02 By Help Net Security For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding of the three primary ransomware attack stages. In this article, we

React to this headline:

Loading spinner

The 3 key stages of ransomware attacks and useful indicators of compromise Read More »

Reinforcing cybersecurity: The network’s role to prevent, detect, and respond to attacks

Reinforcing cybersecurity: The network’s role to prevent, detect, and respond to attacks 19/10/2023 at 07:34 By Help Net Security It’s always DNS. That’s what the famous internet meme popular among sysadmins says anyway. It’s funny because while clearly, every network issue doesn’t resolve to some funky DNS issue, too many network admins have banged their

React to this headline:

Loading spinner

Reinforcing cybersecurity: The network’s role to prevent, detect, and respond to attacks Read More »

DIY attack surface management: Simple, cost-effective and actionable perimeter insights

DIY attack surface management: Simple, cost-effective and actionable perimeter insights 16/10/2023 at 11:46 By Help Net Security Modern-day attack surface management (ASM) can be an intimidating task for most organizations, with assets constantly changing due to new deployments, assets being decommissioned, and ongoing migrations to cloud providers. Assets can be created and forgotten about, only

React to this headline:

Loading spinner

DIY attack surface management: Simple, cost-effective and actionable perimeter insights Read More »

Galxe replacing 110% of funds users lost in recent front-end hack, over $400K

Galxe replacing 110% of funds users lost in recent front-end hack, over $400K 11/10/2023 at 00:03 By Cointelegraph By Derek Andersen The platform was the victim of a phishing scam that routed users to a website that drained their wallets after they approved a transaction. This article is an excerpt from Cointelegraph.com News View Original

React to this headline:

Loading spinner

Galxe replacing 110% of funds users lost in recent front-end hack, over $400K Read More »

Avoiding domain security risks when taking your business online

Avoiding domain security risks when taking your business online 19/09/2023 at 07:06 By Help Net Security Unfortunately, as available domain extensions increase in variety (and uniqueness), so do security risks. In this Help Net Security video, Prudence Malinki, Head of Industry Relations at Markmonitor, discusses best practices enterprises should abide by when kickstarting their online

React to this headline:

Loading spinner

Avoiding domain security risks when taking your business online Read More »

Scroll to Top