Domain name system (DNS) tunneling is a pervasive threat that enables hackers to get any data in and out of a company’s internal network while bypassing most firewalls. The domain name system translates numeric internet protocol addresses that browsers can then use to load web pages — threat actors use tunneling to exploit this process and steal data by hiding it inside DNS traffic.
Most DNS attacks focus on spoofing or misdirection, where an attacker either feeds false information to DNS servers or convinces other systems to query a hostile DNS server instead of a legitimate one. But DNS tunneling essentially smuggles hostile traffic through DNS ports, which makes these attacks difficult to detect and mitigate.
More Stories
Who is the DOGE and X Technician Branden Spikes?
At 49, Branden Spikes isn’t just one of the oldest technologists who has been involved in Elon Musk’s Department of...
Vulnerability in Chaty Pro Plugin Exposes 18,000 WordPress Sites
An arbitrary file upload vulnerability in the Chaty Pro plugin has been identified, affecting 18,000 WordPress sites Read More
Attackers Target Japanese Firms with Cobalt Strike
Attackers are actively exploiting an RCE flaw in Windows PHP-CGI implementations to target Japanese firms, deploying Cobalt Strike for persistence...
The Combined Cipher Machine
Interesting article—with photos!—of the US/UK “Combined Cipher Machine” from WWII. Read More
Cybersecurity Job Satisfaction Plummets, Women Hit Hardest
Layoffs and cutbacks have been cited as major factors in a significant drop in job satisfaction among women working in...
Six Critical Infrastructure Sectors Failing on NIS2 Compliance
Enisa identifies six sectors that it says must improve on NIS2 compliance Read More