SIEM as a Service
Hackers Exploiting DNS Tunneling Service To Bypass Network Firewalls

Hackers Exploiting DNS Tunneling Service To Bypass Network Firewalls

DNS tunneling is a hacking technique that hides information by taking advantage of the DNS protocol. This attack enables threat actors to evade firewalls and security measures.  Hackers retrieve information usually encoded in DNS queries...
DNSSEC+ – Secure Model That Addresses Security And Downsides Of DNSSEC

DNSSEC+ – Secure Model That Addresses Security And Downsides Of DNSSEC

The communication between DNS recursive resolvers and authoritative nameservers is largely unsecured, making it susceptible to on-path and off-path attacks. Though many security proposals have been put forward, they often face implementation challenges or lack...
Sitting Ducks DNS Attack Hijack 35k Domains

Sitting Ducks DNS Attack Hijack 35,000 Domains

Threat actors have been exploiting the attack vector known as Sitting Ducks since at least 2019 to conduct malware delivery, phishing, brand impersonation, and data exfiltration by exploiting flaws in DNS. This widespread flaw, affecting...
BIND DNS Server Vulnerability

BIND DNS Vulnerability Lets Attackers Flood Server With DNS Messages

The Internet Systems Consortium (ISC) has released critical security advisories addressing multiple vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 software, a cornerstone of the Domain Name System (DNS) infrastructure. These vulnerabilities, identified as...
New DoS Attack ‘DNSBomb’ Exploiting DNS Queries & Responses

New DoS Attack ‘DNSBomb’ Exploiting DNS Queries & Responses

Cybersecurity researchers have unveiled a new and potent Denial of Service (DoS) attack, dubbed "DNSBomb." This attack leverages the inherent mechanisms of the Domain Name System (DNS) to create a powerful pulsing DoS attack...
Muddling Meerkat Using DNS As A Powerful Weapon For Sophistication

Muddling Meerkat Using DNS As A Powerful Weapon For Sophistication

Hackers exploit DNS vulnerabilities to redirect users to malicious websites, launch distributed denial-of-service (DDoS) attacks by overwhelming DNS servers, and manipulate domain resolutions to intercept traffic for surveillance or data theft purposes. Infoblox researchers recently...
DNS Tunnel Keylogger – An Offesnsive Post-Exploitation Tool For Pentesters

DNS Tunnel Keylogger – An Offensive Post-Exploitation Tool For Pentesters

A new keylogging server and client tool have been released on GitHub for pentesters. The tool utilizes DNS tunneling to transmit keystrokes through firewalls, potentially evading detection covertly. The tool, DNS-Tunnel-Keylogger, was designed for...
Top 10 Dangerous DNS Attacks Types and The Prevention Measures – 2024

10 Dangerous DNS Attacks Types & Prevention Measures – 2024

Our topic for today seems to be centered around the most common 10 DNS attacks and how to effectively mitigate them. We'll dive into the details of each attack, their potential impact, and recommended...
DNS Analyzer Burp Suite

DNS Analyzer: A New Burp Suite Extension to Find DNS Flaws in Web Apps

DNS flaws are very common on web applications where the DNS resolvers are vulnerable to Kaminsky attacks. If threat actors are able to predict portions of a DNS query and the source ports, they...
Top 11 DNS Filtering Solutions to Stay Protected From Cyber Attacks

Top 11 Best DNS Filtering Solutions – 2024

Before you know about DNS Filtering Solutions, you need to understand that it is a concept that comes in the first place. In this digital world, cybersecurity is essential, and this is a big...
SIEM as a Service

Recent Posts