BIND DNS Software

BIND DNS Software High-Severity Flaws Let Hackers Remotely Trigger DoS Attack

The Internet Systems Consortium (ISC) released security advisories on January 25, 2023, to address flaws in the DNS software suite BIND.  A denial of service could occur if these vulnerabilities are exploited. The flaws that...
Hackers Exploiting DNS Tunneling Service To Bypass Network Firewalls

Hackers Exploiting DNS Tunneling Service To Bypass Network Firewalls

DNS tunneling is a hacking technique that hides information by taking advantage of the DNS protocol. This attack enables threat actors to evade firewalls and security measures.  Hackers retrieve information usually encoded in DNS queries...
DNSSEC+ – Secure Model That Addresses Security And Downsides Of DNSSEC

DNSSEC+ – Secure Model That Addresses Security And Downsides Of DNSSEC

The communication between DNS recursive resolvers and authoritative nameservers is largely unsecured, making it susceptible to on-path and off-path attacks. Though many security proposals have been put forward, they often face implementation challenges or lack...
Sitting Ducks DNS Attack Hijack 35k Domains

Sitting Ducks DNS Attack Hijack 35,000 Domains

Threat actors have been exploiting the attack vector known as Sitting Ducks since at least 2019 to conduct malware delivery, phishing, brand impersonation, and data exfiltration by exploiting flaws in DNS. This widespread flaw, affecting...
BIND DNS Server Vulnerability

BIND DNS Vulnerability Lets Attackers Flood Server With DNS Messages

The Internet Systems Consortium (ISC) has released critical security advisories addressing multiple vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 software, a cornerstone of the Domain Name System (DNS) infrastructure. These vulnerabilities, identified as...
New DoS Attack ‘DNSBomb’ Exploiting DNS Queries & Responses

New DoS Attack ‘DNSBomb’ Exploiting DNS Queries & Responses

Cybersecurity researchers have unveiled a new and potent Denial of Service (DoS) attack, dubbed "DNSBomb." This attack leverages the inherent mechanisms of the Domain Name System (DNS) to create a powerful pulsing DoS attack...
Muddling Meerkat Using DNS As A Powerful Weapon For Sophistication

Muddling Meerkat Using DNS As A Powerful Weapon For Sophistication

Hackers exploit DNS vulnerabilities to redirect users to malicious websites, launch distributed denial-of-service (DDoS) attacks by overwhelming DNS servers, and manipulate domain resolutions to intercept traffic for surveillance or data theft purposes. Infoblox researchers recently...
DNS Tunnel Keylogger – An Offesnsive Post-Exploitation Tool For Pentesters

DNS Tunnel Keylogger – An Offensive Post-Exploitation Tool For Pentesters

A new keylogging server and client tool have been released on GitHub for pentesters. The tool utilizes DNS tunneling to transmit keystrokes through firewalls, potentially evading detection covertly. The tool, DNS-Tunnel-Keylogger, was designed for...
DNS Analyzer Burp Suite

DNS Analyzer: A New Burp Suite Extension to Find DNS Flaws in Web Apps

DNS flaws are very common on web applications where the DNS resolvers are vulnerable to Kaminsky attacks. If threat actors are able to predict portions of a DNS query and the source ports, they...
Alert!! CISA, DHS Urges Government Agencies to Patch Critical DNS Flaw Within 24 Hours

Alert!! CISA, DHS Urges Government Agencies to Patch Critical DNS Flaw Within 24 Hours

The U.S Department of Homeland Security's Cybersecurity and Infrastructure Security Agency has recently issued an order to the civil federal government agencies that are using Windows Server. They have been asked to patch a...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...