Skip to content

Malware

Search

Search

Categories

Categories

Topics

Topics

Sort

Sort

How DNS Security Helps Combat Ransomware

Everyone knows that Ransomware has become costly as attacks target organizations in every industry vertical. Governments, the private sector, and critical infrastructure owners face intolerable data, financial, and reputational losses with seemingly no way to stop it. But perhaps we’re not trying the right way. In most cases, ransomware needs the Domain Name System (DNS) so it can achieve its malicious goals. However, security solutions such as Next-Generation Firewalls (NGFW) have limited DNS coverage in the security ecosystem. Purpose-built DNS...

Data Theft via DNS – Are You Safe?

With cybercriminals using increasingly sophisticated mechanisms, and insider threats still prevalent, organizations have come to accept that the threat of a data breach is here to stay. Rather than wondering “if” my business will become a victim of data theft or ransomware, the question now is “when”. The market stats are pretty scary: according to AV-Test Institute, more than 1 billion malware programs exist, and Sonic Wall’s 2022 report states that 40 million ransomware attacks occur every month.  Despite all...

Data Regulations: Time to Step up Your Data Theft Protection

Today’s data-driven economy is being led by personal data, so naturally focus is turning more strongly to privacy and protection. New regulations have appeared over the last few years, with a rapid acceleration in regions such as North America and APAC. While it’s only fair that regulators introduce these new laws with their associated fines for data breaches, companies are still finding it extremely challenging to ensure confidentiality of their data. Cybercriminals are smart guys – data theft and ransomware...

DNS Security for Healthcare: Controlling Connected Devices and Protecting Patient Data

Over the past few years, healthcare organizations have been rapidly moving towards connected devices and cloud, driven by digital transformation projects and accelerated by the pandemic. However, to allow operating with complete trust, cybersecurity solutions need to keep pace with new telehealth/telemedicine technologies adopted which due to their criticality for patient health must be “always on”. Above all, network infrastructure needs to be reliable, connected medical devices have to be controlled in terms of what infrastructure they are allowed to...

Cybersquatting: The Basics Part 1 – Strategies and Attack Types

DNS is no longer just a name resolution system to make our lives easier in the day-to-day use of applications. It now plays an important role in the various techniques used by attackers. We know about the “Protocol abuse” attacks, which consist of using the DNS protocol in a hijacked manner. In addition, attacks exist that target the DNS to alter or render the DNS service inoperative. In this blog, we will look at other techniques on the DNS that...

Augmenting Zero Trust: Why Using DNS Allow Lists is a No-Brainer

You can’t control what you can’t see, as the saying goes. One of the main pillars of Zero Trust Foundations is Granular Visibility and Control on the traffic. This means being able to differentiate the sources of the traffic (microsegmentation) and their related destinations. From there, security wise, one can decide what has to be done, allowing or denying source-destination combinations. Regarding granular visibility, DNS by nature sees all traffic intents at the earliest possible point in the IP traffic...

DNS Security – A Critical Element of the Shift to Long-Term Remote Work

Twenty months into the COVID-19 pandemic, remote work is no longer a temporary situation but the status quo for many. In fact, recently Gartner forecasts indicated that by the close of this year, 51% of knowledge workers worldwide are expected to be working remotely, up from 27% just two years ago. With an estimate of 32% of all employees worldwide expected to work remotely by the end of 2021, it is clear that the abrupt shift to remote work during...

How to Enhance Threat Intelligence with Newly Observed Domains

Domain names life cycle… Domain names are used as a way to abstract the location of the related application or service and hide its IP address to the user. It is much easier to remember a meaningful name than a meaningless IP address, particularly when it comes to IPv6 addresses. Before anything, one needs to register the new domain name in a Domain Name Registrar. This corresponds to reserving the name so no one else can use it from then...

How DNS Security Protects the Most Targeted Industry: Telecoms

The past year has only increased the pressure placed upon the telecoms and media industry as companies continue their transition to the hybrid working model post pandemic and organizations continue to implement 5G. The rise in demand has left mobile operators and ISPs increasingly prone to threat actors using DNS to target the industry. The impacts of these cyber threats are felt globally, as telecoms provide the infrastructure needed to go about our daily lives, from our work to our...

SOLIDserver Release 8.0: Enhancing Multi Cloud Control and Security

The Release 8.0 of SOLIDserver puts strong focus on support of multi cloud services and strengthening of DNS Security, thus helping network teams improve control and visibility over their entire infrastructure. In particular, it enhances the existing DNS Cloud feature with Azure DNS Zones capability, and builds on EfficientIP’s award-winning DNS Guardian solution for improving filtering of DNS queries and expanding capacity of security policies. The main features introduced with Release 8.0 include the following: 1) DNS Cloud for Azure...

Simplify & Secure Your Network

When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.

SOLIDserver UX interface