Hackers Exploiting DNS Tunneling Service To Bypass Network Firewalls

Hackers Exploiting DNS Tunneling Service To Bypass Network Firewalls

DNS tunneling is a hacking technique that hides information by taking advantage of the DNS protocol. This attack enables threat actors to evade firewalls...
DNSSEC+ – Secure Model That Addresses Security And Downsides Of DNSSEC

DNSSEC+ – Secure Model That Addresses Security And Downsides Of DNSSEC

The communication between DNS recursive resolvers and authoritative nameservers is largely unsecured, making it susceptible to on-path and off-path attacks. Though many security proposals have...
Sitting Ducks DNS Attack Hijack 35k Domains

Sitting Ducks DNS Attack Hijack 35,000 Domains

Threat actors have been exploiting the attack vector known as Sitting Ducks since at least 2019 to conduct malware delivery, phishing, brand impersonation, and...
BIND DNS Server Vulnerability

BIND DNS Vulnerability Lets Attackers Flood Server With DNS Messages

The Internet Systems Consortium (ISC) has released critical security advisories addressing multiple vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 software, a cornerstone...
New DoS Attack ‘DNSBomb’ Exploiting DNS Queries & Responses

New DoS Attack ‘DNSBomb’ Exploiting DNS Queries & Responses

Cybersecurity researchers have unveiled a new and potent Denial of Service (DoS) attack, dubbed "DNSBomb." This attack leverages the inherent mechanisms of the Domain...
Muddling Meerkat Using DNS As A Powerful Weapon For Sophistication

Muddling Meerkat Using DNS As A Powerful Weapon For Sophistication

Hackers exploit DNS vulnerabilities to redirect users to malicious websites, launch distributed denial-of-service (DDoS) attacks by overwhelming DNS servers, and manipulate domain resolutions to...
DNS Tunnel Keylogger – An Offesnsive Post-Exploitation Tool For Pentesters

DNS Tunnel Keylogger – An Offensive Post-Exploitation Tool For Pentesters

A new keylogging server and client tool have been released on GitHub for pentesters. The tool utilizes DNS tunneling to transmit keystrokes through firewalls,...
Top 10 Dangerous DNS Attacks Types and The Prevention Measures – 2024

10 Dangerous DNS Attacks Types & Prevention Measures – 2024

Our topic for today seems to be centered around the most common 10 DNS attacks and how to effectively mitigate them. We'll dive into...
DNS Analyzer Burp Suite

DNS Analyzer: A New Burp Suite Extension to Find DNS Flaws in Web Apps

DNS flaws are very common on web applications where the DNS resolvers are vulnerable to Kaminsky attacks. If threat actors are able to predict...
Top 11 DNS Filtering Solutions to Stay Protected From Cyber Attacks

Top 11 Best DNS Filtering Solutions – 2024

Before you know about DNS Filtering Solutions, you need to understand that it is a concept that comes in the first place. In this...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...