From infoblox.com
Multiple DNS Actors linked to Domain Hijacking | Infoblox
2 2
Learn how DNS threat actors hijack domains and use them in their malicious campaigns.
#cti #dns #ioc #infoblox #phishing #cybercrime #attackVector #infobloxthreatintel #cyberthreatintelligence #infosec
15h ago
From infoblox.com
Why cybercriminals like DNS | Infoblox
0 0
Explore why cybercriminals like DNS. Learn more about recent weaponizations and how to protect.
on Oct 24
From infoblox.com
Digital Identity Crisis: Are Your Internal Domains Leading Double Lives? | Infoblox
0 0
Discover how your organization may be unintentionally exposed to DNS threats stemming from collisions between internal and external domains. Learn why understanding this risk is crucial for safeguarding your organization's digital identity and preventing unauthorized access.
on Oct 17
From infoblox.com
0 0
Our new reputation scoring algorithm calculates the relative risk of items in a wide range of data sets, providing valuable insights and meaningful comparisons.
on Sep 26
From infoblox.com
Deep Fake Crypto Scams | Infoblox
0 0
Cybercriminals used presidential debate-themed deep fake YouTube videos to advertise cryptocurrency scams. DNS Detection and Response can protect users by blocking access to these suspicious domains before the scam is launched.
on Sep 18
From infoblox.com
0 0
Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS-based threats.
on Aug 29
From infoblox.com
Click Bait and Switch: Malicious Traffic Distribution Systems | Infoblox
0 3
Cybercriminals are using traffic distribution systems to redirect victims through massive networks filled with scams and malware. While they do their best to hide in the shadows, DNS can shine a light on these hidden networks and how they work.
on Aug 12
From infoblox.com
DNS Early Detection - Breaking the Black Basta Ransomware Kill Chain | Infoblox
0 0
Discover the increasing danger of malicious internet domain names and how to detect and block them sooner using Infoblox Threat Intel. Learn how to protect your organization from these DNS-based threats.
on Aug 2
From infoblox.com
Who Knew? Domain Hijacking is So Easy | Infoblox
0 1
Learn about the insidious DNS attack vector that threat actors are using to hijack domains from major brands, government institutions, and other organizations, large and small. Find out how to determine whether your domain name is at risk.
on Aug 1
From infoblox.com
Not All That Glitters is Gold: Cybercriminals Get in the Games | Infoblox
0 0
Will you take the bait or avoid the hook? With fake Olympic merchandise websites, ticket scams, and hacktivists pursuing their political agendas; the games aren't just entertainment for the masses, they are a threat actor's golden opportunity.
on Jul 30
From infoblox.com
Vigorish Viper: A Venomous Bet
0 0
This groundbreaking report unveils the discovery of a technology suite and its connection to Chinese organized crime, money laundering, and human trafficking throughout Southeast Asia.
on Jul 22
From infoblox.com
DNS Links Chinese Organized Crime and Shady Sports Sponsorships | Infoblox
0 0
Learn how the detection of a single anomalous domain led to the discovery of a vast enterprise leveraging sports sponsorships for Chinese organized crime.
on Jul 22
From infoblox.com
0 0
Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs used by threat actors like Revolver Rabbit to deliver XLoader, Hancitor, and other malware
on Jul 20
From infoblox.com
REGISTERED DGAs: The Prolific New Menace No One Is Talking About
0 0
Registered domain generation algorithms (RDGAs) are a programmatic mechanism that allows threat actors to create many domain names at once, or over time, to register for use in their criminal infrastructure.
on Jul 18
From infoblox.com
Unveiling VexTrio Viper’s New DNS TDS Domain: How Infoblox Threat Intel stays one step ahead
0 0
Learn how VexTrio Viper adapts to industry reporting and about the role of Infoblox Threat Intel in identifying and responding to these changes. Despite their adaptations, VexTrio Viper is still detectable.
on Jun 5
From infoblox.com
Suspicious DNS Probing Operation Amplified | Infoblox
0 0
Learn how Chinese actors are probing DNS networks around the world and how an attack surface management tool is amplifying the suspicious activity.
on Jun 4
From infoblox.com
How to Implement Commercial Data Protection for Copilot using Infoblox DNS| Infoblox
0 0
As a commercial user of Microsoft’s generative AI system, Copilot, you’re likely aware of its incredible capabilities. However, with great power comes great responsibility, especially regarding data protection and privacy. In this blog post, Paul Flores will explore the risks of using Copilot...
on May 13
From infoblox.com
Infoblox Discovers Multiyear Sophisticated Chinese DNS Operation | Infoblox
0 0
Learn how unusual mail server record responses from China’s Great Firewall accidentally revealed a years-long operation using Domain Name System (DNS) queries to penetrate global networks.
on Apr 30
From infoblox.com
[Report] Muddling Meerkat: The Great Firewall Manipulator
0 0
This paper introduces a perplexing actor, Muddling Meerkat, who appears to be a People’s Republic of China (PRC) nation state actor.
on Apr 29
From infoblox.com
Muddling Meerkat - Threat Actor Detected by Infoblox Threat Intel
0 0
Learn more about the latest threat actor found by Infoblox Threat Intel: Muddling Meerkat, who exhibits advanced DNS manipulation capabilities.
on Apr 29
From infoblox.com
Traffic Distribution Systems at the Heart of Cybercrime
0 0
Join Renée Burton, Infoblox's Head of Threat Intelligence, along with researchers Christopher Kim and Randy McEoin, as they delve into groundbreaking research on VexTrio, a web traffic broker fueling cybercrime. Learn about its operations, impact on the cybercrime landscape, and its role as a...
on Mar 25
From infoblox.com
ULA is Broken (in Dual-stack Networks)
0 0
ULA is Broken (in Dual-stack Networks). I first started outlining some of the difficulties with Unique Local Addresses (ULA, RFC 4193) in the blog post “IPv6 ULA and NAT. Is It Better Than Global Unicast?” back in January of 2014. First: Why you shouldn’t reflexively deploy ULAs and NAT66Second:...
on Mar 9
From infoblox.com
DNS Used to Hide Fake Investment Platform Schemes | Infoblox
0 0
Learn how the threat actor Savvy Seahorse Facebook ads to lure users to fake investment platforms and leverages DNS to allow their attacks to persist for years.
on Mar 2
From infoblox.com
Ivanti Connect Secure VPN Exploitation - Correctly Interpreting DNS IoCs | Infoblox
0 0
Domains in a list of IoCs such as the ones found in recent articles about attacks involving Ivanti 0-days are a valuable product of incident response, but they can’t simply be added to a blocklist. Blindly adding domains to blocklists can negatively impact customer networks more than any...
on Mar 1
From infoblox.com
Securing DNS and DHCP: Best Practices to Prevent Spoofing | Infoblox
0 0
How often do you think about the critical network services DNS, DHCP, and IPAM (DDI)? DDI is a collection of core network services that make the Internet work. From on-premises to hybrid cloud to remote users, DDI touches nearly every facet of network connectivity for a modern business.
on Feb 5
From infoblox.com
Traffic Distribution Systems at the Heart of Cybercrime | Infoblox
0 1
Join Infoblox’s Head of Threat Intelligence, Renée Burton, for an in-depth discussion with researchers Christopher Kim and Randy McEoin, who will discuss new research on VexTrio and its role in the cybercrime economy as a traffic distribution system (TDS).
on Jan 25
From infoblox.com
SMS Cybercrime: A DNS Perspective
0 0
Cybersecurity awareness training alone will not protect consumers and organizations from the onslaught of attacks being levied through SMS and texting apps. This webinar will show you what is happening and why DNS detection and response matters in combating SMS cybercrime.
on Jan 25
From infoblox.com
Decoy Dog is No Ordinary Pupy: Separating a Sly DNS Malware from the Pack
0 0
Explore the intricacies of Decoy Dog, a sophisticated DNS-based threat, and discover how Infoblox's cybersecurity solutions can bolster your defenses.
on Jan 25
From infoblox.com
VexTrio at the Center of Affiliate Cybercrime Program | Infoblox
0 0
DNS threat actor VexTrio runs a large-scale criminal affiliate program including ClearFake and SocGholish actors.
on Jan 24
From infoblox.com
Do False Positives in Threat Intel Matter? Not Always. | Infoblox
0 0
The most common concern in threat intelligence is false positives. But should it be? This article explains how false positives occur in machine learning algorithms and how to decide when they matter.
on Jan 17
From infoblox.com
SMS Cybercrime: A DNS Perspective | Webinar | Infoblox
0 0
Join this Infoblox webinar and learn how Infoblox detects threats that are used in SMS attacks.
on Dec 4
From infoblox.com
To Aid and Abet: Prolific Puma Helps Cybercriminals Evade Detection | Infoblox
0 0
Learn how a link shortening service that supports cybercrime remained undetected for years and was discovered via Domain Name Service (DNS) analytics.
on Oct 31, 2023
From infoblox.com
In MFA We Trust… Think Again. | Infoblox
0 0
Discover the rising threat of MFA lookalike domains and how they are exploited for account takeovers. Learn how the new Rapid Domain Triage capability can protect you!
on Oct 17, 2023
From infoblox.com
DNS Threat Actor Phishes Consumers Uninterrupted for Years | Infoblox
0 0
Learn how a DNS threat actor targets consumers through lookalike domains and manages to operate for over 5 years.
on Oct 12, 2023
From infoblox.com
RDGAs: The New Face of Domain Generation Algorithms | Infoblox
0 0
Think you know what DGA means? Think Again. RDGAs are used to register tens of thousands of domains by DNS threat actors every day.
on Oct 5, 2023