by DNSFilter Team on Jun 3, 2024 2:44:48 PM
Domain name systems (DNS) has been undergirding the internet for more than four decades — and still it’s a daily pathway for cyberattacks. Considering how long security pros have had to create a better way to secure it, DNS security continues to lag, posing a significant security risk today. It remains responsible, at least to some extent, for a significant portion of cyber-attacks.
There’s a wide array of attacks based on DNS available to bad actors, including DDoS attacks, malware, phishing and domain theft. Attacks like these have the potential to cause significant disruption to an organization. Though there are many examples to draw from, the Google Cloud and ChatGPT outages are some of the most high-profile current incidents. Almost every aspect of modern malware uses DNS in some way.
Let’s examine ways that criminals are leveraging DNS currently and, crucially, what a security team can improve upon to maintain the upper hand.
Each year, cybersecurity companies publish a number of research reports focusing on different aspects of cybersecurity and breach trends. Below is a list of some of the most alarming statistics from several reports published throughout the year from various companies.
{% module_block module "widget_6aeb08dc-4790-47de-a546-385b24cb0188" %}{% module_attribute "button_text" is_json="true" %}"READ MORE"{% end_module_attribute %}{...Have you ever tried to build a machine learning classifier where you only had labels for one of the classes?
Almost every company is chasing the latest shiny object in an effort to be more competitive. The latest shiny object isAI, but before that, it was cloud, 5G, etc. The problem is that all of these new technologies also increase security risks — and the reality is that most organizations are ill-prepared for the existing security risks, let alone the new ones created by the addition of emerging technologies.