Share this
[DNSFilter September Newsletter] You updated your iPhone, right?
by DNSFilter on Sep 15, 2021 12:00:00 AM

Before we begin: Your Apple devices need to be updated
In case you missed the article from Citizen Lab and the patch update from Apple: You need to update your systems to macOS Big Sur 11.6, iOS 14.8, and watchOS 7.6.2. This is obviously critical for corporate offices (DNSFilter exclusively uses Macs, so we get it), but you also need to update your personal devices.
The NSO group is behind this zero-click Apple messenger vulnerability. If you’re a Darknet Diaries fan (like we are), you’re already well aware of NSO. Back in July, we actually started adding known NSO spyware domains to our “Trackers” category.
So if you’re looking for an additional layer of protection, adding this “Trackers” category to your block list can do just that. Learn more about our "Trackers" category here.

With that out of the way...
C2, CNC, Command & Control—Whatever you call it! What is it?
C2 servers are an important part of malware attacks. We’ll touch on them in our webinar later today, but here we want to go into detail. Also known as CNC, these abbreviations stem from the full name: Command and Control. Taking its name from the military term, NATO defined Command and Control as “the exercise of authority and direction by a properly designated individual over assigned resources in the accomplishment of a common goal.”
In this case, the authorities are threat actors and the common goal is a malicious one.
What are C2 servers? They are the servers contacted by a compromised host (a device with malware on it) and the attack servers. The attack server and compromised device communicate over a C2 channel, and the communication is mostly done over trusted traffic such as DNS. The infected host receives commands from the C2 server. The command might be to deploy the attack, begin data exfiltration, or to sit and wait.
Keep reading about C2 attacks.
Spotlight on: DNSFilter’s Relay
Our Knowledge Base has plenty of helpful articles to help you with the more technical aspects of a deployment.
You might be familiar with our Network or Roaming Client deployment. But there is a third way to deploy DNSFilter that gives you blanket protection possible at the network-level but with the granularity of end device protection: the DNSFilter Relay.
Relying on the Relay also means you can enforce individual device policies via static IPs without installing individual Roaming Clients.
In this deployment, DNS requests are performed by way of the Relay (essentially a proxy) where policy enforcement and reporting is logged. The Relay is available as a virtual machine (this is our recommended option), Docker container, or binary.
Full implementation instructions can be found here.
Are you concerned with finding out what’s the latest with DNSFilter? Check out our Changelog.

Share this
Categories
- Featured (176)
- Cybersecurity & IT (32)
- DNS (27)
- Cyber Threats (16)
- DNSFilter Updates (13)
- IndyCar (9)
- Product & Features (9)
- IT (8)
- Protective DNS (7)
- Content Filtering (6)
- DNSFilter Community (6)
- IT Challenges (4)
- Public Wi-Fi (4)
- AI (3)
- Deep Dive (3)
- MSP (3)
- Staying Ahead of Cyber Threats (3)
- Machine Learning (2)
- Malware (2)
- Phishing (2)
- Team (2)
- Compare (1)
- Cybersecurity Brief (1)
- Events (1)
- Ransomware (1)
- Tech (1)

The Old-School Operations Role: Backbone or Bottleneck?
In the early days of IT, the operations team was the unsung hero—the silent, and often siloed, force that kept everything running. They were responsible for the infrastructure: Servers, databases, and networks that powered the business. They managed deployments, monitored systems, and ensured uptime. If it was working, no one noticed them. If it wasn't? Well, then the questions started: "Wha...

When Vintage Goes Viral (In All the Wrong Ways)
Remember that time you found your old Tamagotchi and thought, "Hey, this could be fun again"? Well, cybercriminals are having a similar nostalgic moment, but instead of resurrecting digital pets, they're breathing new life into outdated malware and long-forgotten data breaches. Welcome to the world of recycled cyber threats, where everything old is terrifyingly new again.

The Growing Threat of Malicious Domains in Cybersecurity
As cybercriminals continue to evolve their tactics, domain-based attacks like cybersquatting, typosquatting, and other malicious domains have become a significant threat to businesses and individuals alike. These attacks are designed to exploit trust, impersonate brands, and mislead users into handing over sensitive information—often resulting in financial losses, data breaches, and reputat...