Blocking DNS Covert Channel Attacks
Blocking DNS Covert Channel Attacks Part 1 of 5 DNS is a boon to the non-technical Internet user, simplifying address determination by providing more intuitive, human-readable uniform resource locator...
View ArticleThe Importance of DNS Planning
The Importance of DNS Planning Prepare for other DNS events DNS overlooked Apart from a few exceptions, DNS has been overlooked inside large telcos and ISPs around the world, usually sitting in a grey...
View ArticleFive DNS Security Tips
Five DNS Security Tips Highlights from the McAfee FOCUS Event DNS protocol at FOCUS FOCUS is a large security event hosted by McAfee and is a platform for security professionals to exchange ideas, real...
View ArticleU.S. Banks Caught in a Cyberwar
U.S. Banks Caught in a Cyberwar Get tighter security around your DNS infrastructure Cyberwar. What is it good for? (Absolutely nothin’) “Mrt. Izz ad-Din al-Qassam Cyber Fighters” is a hacker group...
View ArticleWould Dual Custody Mean Better DNS Security?
Would Dual Custody Mean Better DNS Security? Why we should bring two person authorization to the DNS world The 1983 sci-fi thriller movie, WarGames, opens with a scene where two men receive orders to...
View ArticleBlocking DNS Covert Channel Attacks: Encoding Algorithms
Blocking DNS Covert Channel Attacks: Encoding Algorithms Part 2 of 5 I previously introduced the idea of detecting and/or blocking the covert exfiltration of data via the DNS query protocol. That...
View ArticleDNS Covert Channel Attacks: Detecting Anomalies
DNS Covert Channel Attacks: Detecting Anomalies Part 3 of 5 In part 1 of this series, I introduced the idea of detecting and blocking data being exfiltrated or infiltrated using the DNS protocol. Part...
View ArticleDNS Covert Channel Attacks: Anomaly Occurrence
DNS Covert Channel Attacks: Anomaly Occurrence Part 4 of 5 In the prior articles of this series (1, 2, 3), I introduced and expanded on the idea of detection of data being exfiltrated or infiltrated...
View ArticleDNS Covert Channels: Solution Design and Implementation
DNS Covert Channels: Solution Design and Implementation Part 5 of 5 We are finally nearing the end of our series on “DNS Covert Channel Attacks”. So far, we have looked at the DNS data exfiltration...
View ArticleA Difficult New DNS DDoS Attack
A Difficult New DNS DDoS Attack Learn what bots are doing and how they take down DNS More and more DNS administrators know that attackers can use reflection or request open recursive DNS servers to...
View ArticleKeep DNS Protected With Actionable Security Insight
Keep DNS Protected With Actionable Security Insight Understanding DNS traffic Can you be sure your business isn’t experiencing a DNS attack right now? In this post, I’ll discuss how insight into your...
View ArticleA Difficult New DNS DDoS Attack
A Difficult New DNS DDoS Attack – Chris Donovan Learn what bots are doing and how they take down DNS More and more DNS administrators know that attackers can use reflection or request open recursive...
View Article
More Pages to Explore .....