Skip to content

DNS Security Issues

Search

Search

Categories

Categories

Topics

Topics

Sort

Sort

DNS RFCs: The Elephant in the Room – Part 2

As stated in Part 1 of this series, DNS RFCs have a great impact on how DNS operates. It comes with a risk factor and can impact security. In this second part, we will continue to discuss the impact and provide some food for thought on how to deal with it. DNS is a clear Favorite – Everyone, and I mean EVERYONE loves it! DNS has had more than 25 years to mature, and with that, also the bad actors that want...

Network Security for Higher Education: The Key Role of DNS

Last year, Education and Research were the top targets for cybercriminals, according to a study by Check Point. With remote learning becoming normal, bad actors are finding new ways to leverage techniques such as phishing and ransomware, often using DNS as an attack target or a vector. IDC’s 2022 Global DNS Threat Report shows that 84% of schools and universities were victims of DNS attacks in the past 12 months. The report then goes on to provide recommendations on how purpose-built DNS...

DNS RFCs: The Elephant in the Room – Part 1

DNS goes back a long way, it is more than 25 years old and is one of the most used, attacked, and implemented protocols by far. Needless to say, it has some security implications and risks attached to it too. Most of them are well documented and discussed, but one of them seems to be overlooked: RFCs (and DRAFTS) What is an “RFC” The Internet Engineering Task Force (IETF) maintains and has a process for approving Request-for-Comments (RFC). Solely to create internet...

DNS Security for Healthcare: Controlling Connected Devices and Protecting Patient Data

Over the past few years, healthcare organizations have been rapidly moving towards connected devices and cloud, driven by digital transformation projects and accelerated by the pandemic. However, to allow operating with complete trust, cybersecurity solutions need to keep pace with new telehealth/telemedicine technologies adopted which due to their criticality for patient health must be “always on”. Above all, network infrastructure needs to be reliable, connected medical devices have to be controlled in terms of what infrastructure they are allowed to...

SD-WAN: Why DDI is Key for Efficient Management

As published in a recent article in SDxCentral based on research from MEF, both the SD-WAN and SASE markets show strong revenue and activity, but they both face challenges impacting market efficiencies and growth. Let’s review the related challenges presented in the article and see how a solid DDI Solution can help mitigate these challenges and ease multi-vendor SD-WAN and integration of Security options. Challenges with SD-WAN for Service Providers and Enterprises Across the globe, 36 Service Provider experts were surveyed and the results...

Access Control via DNS Applied to Parental Control

More and more contents targeting children and teenagers are available online on various media from social networks, websites, video streaming to gaming platforms. These contents are reachable via the many household devices and are rarely moderated from their providers making it complex for parents to regain control over what their children can access online. For service providers the problem is even worse as they face regulatory obligations enforcing them to offer a minimum level of protection of the content they...

SOLIDserver 8.1: Simplifying Multi Cloud Management and App Access Control

The Release 8.1 of SOLIDserver enhances multi cloud agility and efficiency for organizations by simplifying and automating cloud management, as well as enabling zero trust network security by improving application access control with simpler microsegmentation. With the addition of Google Cloud Platform (GCP) to AWS and Microsoft Azure, organizations are given the capability to move more easily between individual cloud providers according to their business needs, helping avoid cloud lock-in. And on the network security side, the new release incorporates...

Hybrid Workforce: Who’s Managing DNS?

Post pandemic situation sees the confirmation of working from home but also working from anywhere. After COVID-19, 92% of eligible people expect to work from home at least 1 day per week, and 80% expected to work at least 3 days from home per week according to a survey by Owl labs. Most enterprises seem to accept this new paradigm as it improves the overall productivity of the workforce. Provided the logistics of working outside the Enterprise can be addressed,...

Cybersquatting: The Basics Part 2 – How to Protect Yourself

In part 1 of this blog series we learned about the strategies and attack types used for cybersquatting. We’ll now go through some ideas on how companies can protect themselves. Tools to help people On a Kali distribution, one can find a number of ready-to-use tools for typosquatting.Among these tools, “urlcrazy” is probably the best known. It is a very powerful tool, which from a domain name is able to generate other domain names with strong similarities and test their...

Cybersquatting: The Basics Part 1 – Strategies and Attack Types

DNS is no longer just a name resolution system to make our lives easier in the day-to-day use of applications. It now plays an important role in the various techniques used by attackers. We know about the “Protocol abuse” attacks, which consist of using the DNS protocol in a hijacked manner. In addition, attacks exist that target the DNS to alter or render the DNS service inoperative. In this blog, we will look at other techniques on the DNS that...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface