• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From infoblox.com

Why cybercriminals like DNS | Infoblox

0 0

Explore why cybercriminals like DNS. Learn more about recent weaponizations and how to protect.

on Oct 24

From infoblox.com

Digital Identity Crisis: Are Your Internal Domains Leading Double Lives? | Infoblox

0 0

Discover how your organization may be unintentionally exposed to DNS threats stemming from collisions between internal and external domains. Learn why understanding this risk is crucial for safeguarding your organization's digital identity and preventing unauthorized access.

on Oct 17

From infoblox.com

Reliable Reputation Scoring

0 0

Our new reputation scoring algorithm calculates the relative risk of items in a wide range of data sets, providing valuable insights and meaningful comparisons.

on Sep 26

From infoblox.com

Deep Fake Crypto Scams | Infoblox

0 0

Cybercriminals used presidential debate-themed deep fake YouTube videos to advertise cryptocurrency scams. DNS Detection and Response can protect users by blocking access to these suspicious domains before the scam is launched.

on Sep 18

From infoblox.com

DNS Early Detection - Malicious Trojan Installers for WINSCP and PUTTY - Breaking the Kill Chain | Infoblox

0 0

Discover the increasing danger of malicious internet domain names and how you can detect and block them sooner using Infoblox suspicious domain feeds. Learn how to protect your organization from these DNS-based threats.

on Aug 29

From infoblox.com

Click Bait and Switch: Malicious Traffic Distribution Systems | Infoblox

0 3

Cybercriminals are using traffic distribution systems to redirect victims through massive networks filled with scams and malware. While they do their best to hide in the shadows, DNS can shine a light on these hidden networks and how they work.

on Aug 12

From infoblox.com

DNS Early Detection - Breaking the Black Basta Ransomware Kill Chain | Infoblox

0 0

Discover the increasing danger of malicious internet domain names and how to detect and block them sooner using Infoblox Threat Intel. Learn how to protect your organization from these DNS-based threats.

on Aug 2

From infoblox.com

Who Knew? Domain Hijacking is So Easy | Infoblox

0 1

Learn about the insidious DNS attack vector that threat actors are using to hijack domains from major brands, government institutions, and other organizations, large and small. Find out how to determine whether your domain name is at risk.

on Aug 1

From infoblox.com

Not All That Glitters is Gold: Cybercriminals Get in the Games | Infoblox

0 0

Will you take the bait or avoid the hook? With fake Olympic merchandise websites, ticket scams, and hacktivists pursuing their political agendas; the games aren't just entertainment for the masses, they are a threat actor's golden opportunity.

on Jul 30

From infoblox.com

Vigorish Viper: A Venomous Bet

0 0

This groundbreaking report unveils the discovery of a technology suite and its connection to Chinese organized crime, money laundering, and human trafficking throughout Southeast Asia.

on Jul 22

From infoblox.com

DNS Links Chinese Organized Crime and Shady Sports Sponsorships | Infoblox

0 0

Learn how the detection of a single anomalous domain led to the discovery of a vast enterprise leveraging sports sponsorships for Chinese organized crime.

on Jul 22

From infoblox.com

Registered DGAs - RDGAs change threat actor landscape with Revolver Rabbit & XLoader malware | Infoblox

0 0

Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs used by threat actors like Revolver Rabbit to deliver XLoader, Hancitor, and other malware

on Jul 20

From infoblox.com

REGISTERED DGAs: The Prolific New Menace No One Is Talking About

0 0

Registered domain generation algorithms (RDGAs) are a programmatic mechanism that allows threat actors to create many domain names at once, or over time, to register for use in their criminal infrastructure.

on Jul 18

From infoblox.com

Unveiling VexTrio Viper’s New DNS TDS Domain: How Infoblox Threat Intel stays one step ahead

0 0

Learn how VexTrio Viper adapts to industry reporting and about the role of Infoblox Threat Intel in identifying and responding to these changes. Despite their adaptations, VexTrio Viper is still detectable.

on Jun 5

From infoblox.com

Suspicious DNS Probing Operation Amplified | Infoblox

0 0

Learn how Chinese actors are probing DNS networks around the world and how an attack surface management tool is amplifying the suspicious activity.

on Jun 4

From infoblox.com

How to Implement Commercial Data Protection for Copilot using Infoblox DNS| Infoblox

0 0

As a commercial user of Microsoft’s generative AI system, Copilot, you’re likely aware of its incredible capabilities. However, with great power comes great responsibility, especially regarding data protection and privacy. In this blog post, Paul Flores will explore the risks of using Copilot...

on May 13

From infoblox.com

Infoblox Discovers Multiyear Sophisticated Chinese DNS Operation | Infoblox

0 0

Learn how unusual mail server record responses from China’s Great Firewall accidentally revealed a years-long operation using Domain Name System (DNS) queries to penetrate global networks.

on Apr 30

From infoblox.com

[Report] Muddling Meerkat: The Great Firewall Manipulator

0 0

This paper introduces a perplexing actor, Muddling Meerkat, who appears to be a People’s Republic of China (PRC) nation state actor.

on Apr 29

From infoblox.com

Muddling Meerkat - Threat Actor Detected by Infoblox Threat Intel

0 0

Learn more about the latest threat actor found by Infoblox Threat Intel: Muddling Meerkat, who exhibits advanced DNS manipulation capabilities.

on Apr 29

From infoblox.com

Traffic Distribution Systems at the Heart of Cybercrime

0 0

Join Renée Burton, Infoblox's Head of Threat Intelligence, along with researchers Christopher Kim and Randy McEoin, as they delve into groundbreaking research on VexTrio, a web traffic broker fueling cybercrime. Learn about its operations, impact on the cybercrime landscape, and its role as a...

on Mar 25

From infoblox.com

ULA is Broken (in Dual-stack Networks)

0 0

ULA is Broken (in Dual-stack Networks). I first started outlining some of the difficulties with Unique Local Addresses (ULA, RFC 4193) in the blog post “IPv6 ULA and NAT. Is It Better Than Global Unicast?” back in January of 2014. First: Why you shouldn’t reflexively deploy ULAs and NAT66Second:...

on Mar 9

From infoblox.com

DNS Used to Hide Fake Investment Platform Schemes | Infoblox

0 0

Learn how the threat actor Savvy Seahorse Facebook ads to lure users to fake investment platforms and leverages DNS to allow their attacks to persist for years.

on Mar 2

From infoblox.com

Ivanti Connect Secure VPN Exploitation - Correctly Interpreting DNS IoCs | Infoblox

0 0

Domains in a list of IoCs such as the ones found in recent articles about attacks involving Ivanti 0-days are a valuable product of incident response, but they can’t simply be added to a blocklist. Blindly adding domains to blocklists can negatively impact customer networks more than any...

on Mar 1

From infoblox.com

Securing DNS and DHCP: Best Practices to Prevent Spoofing | Infoblox

0 0

How often do you think about the critical network services DNS, DHCP, and IPAM (DDI)? DDI is a collection of core network services that make the Internet work. From on-premises to hybrid cloud to remote users, DDI touches nearly every facet of network connectivity for a modern business.

on Feb 5

From infoblox.com

Traffic Distribution Systems at the Heart of Cybercrime | Infoblox

0 1

Join Infoblox’s Head of Threat Intelligence, Renée Burton, for an in-depth discussion with researchers Christopher Kim and Randy McEoin, who will discuss new research on VexTrio and its role in the cybercrime economy as a traffic distribution system (TDS).

on Jan 25

From infoblox.com

SMS Cybercrime: A DNS Perspective

0 0

Cybersecurity awareness training alone will not protect consumers and organizations from the onslaught of attacks being levied through SMS and texting apps. This webinar will show you what is happening and why DNS detection and response matters in combating SMS cybercrime.

on Jan 25

From infoblox.com

Decoy Dog is No Ordinary Pupy: Separating a Sly DNS Malware from the Pack

0 0

Explore the intricacies of Decoy Dog, a sophisticated DNS-based threat, and discover how Infoblox's cybersecurity solutions can bolster your defenses.

on Jan 25

From infoblox.com

VexTrio at the Center of Affiliate Cybercrime Program | Infoblox

0 0

DNS threat actor VexTrio runs a large-scale criminal affiliate program including ClearFake and SocGholish actors.

on Jan 24

From infoblox.com

Do False Positives in Threat Intel Matter? Not Always. | Infoblox

0 0

The most common concern in threat intelligence is false positives. But should it be? This article explains how false positives occur in machine learning algorithms and how to decide when they matter.

on Jan 17

From infoblox.com

SMS Cybercrime: A DNS Perspective | Webinar | Infoblox

0 0

Join this Infoblox webinar and learn how Infoblox detects threats that are used in SMS attacks.

on Dec 4

From infoblox.com

To Aid and Abet: Prolific Puma Helps Cybercriminals Evade Detection | Infoblox

0 0

Learn how a link shortening service that supports cybercrime remained undetected for years and was discovered via Domain Name Service (DNS) analytics.

on Oct 31, 2023

From infoblox.com

In MFA We Trust… Think Again. | Infoblox

0 0

Discover the rising threat of MFA lookalike domains and how they are exploited for account takeovers. Learn how the new Rapid Domain Triage capability can protect you!

on Oct 17, 2023

From infoblox.com

DNS Threat Actor Phishes Consumers Uninterrupted for Years | Infoblox

0 0

Learn how a DNS threat actor targets consumers through lookalike domains and manages to operate for over 5 years.

on Oct 12, 2023

From infoblox.com

RDGAs: The New Face of Domain Generation Algorithms | Infoblox

0 0

Think you know what DGA means? Think Again. RDGAs are used to register tens of thousands of domains by DNS threat actors every day.

on Oct 5, 2023