Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: DNS

GoBruteforcer: Golang-Based Botnet Actively Harvests Web ServersMalware conceptual image, covering variants such as GoBruter
29,511
people reacted

GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers

  • By Siddharth Sharma, Yang Ji, Anmol Maurya and Dongrui Zeng
  • March 10, 2023 at 6:00 AM

14

7 min. read

Subdomain Reputation: Detecting Malicious Subdomains of Public Apex DomainsA pictorial representation of a crybercriminal like those who execute attacks with subdomains. It shows a criminal opening a door on a laptop screen.
27,965
people reacted

Subdomain Reputation: Detecting Malicious Subdomains of Public Apex Domains

  • By Rebekah Houser and Daiping Liu
  • March 2, 2023 at 6:00 AM

3

10 min. read

Trending

  • Malicious JavaScript Injection Campaign Infects 51k Websites by Brody Kutt
  • Finding Gozi: Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
  • Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
CNAME Cloaking: Disguising Third Parties Through the DNSDNS security conceptual image, covering concepts including CNAME cloaking
50,967
people reacted

CNAME Cloaking: Disguising Third Parties Through the DNS

  • By Rebekah Houser and Daiping Liu
  • October 24, 2022 at 6:00 AM

6

10 min. read

Detecting Emerging Network Threats From Newly Observed DomainsDNS security conceptual image, covering topics including malicious newly observed domains
50,707
people reacted

Detecting Emerging Network Threats From Newly Observed Domains

  • By Zhanhao Chen, Daiping Liu, Wanjin Li and Fan Fei
  • October 17, 2022 at 6:00 AM

8

8 min. read

Domain Shadowing: A Stealthy Use of DNS Compromise for CybercrimeDNS security and issues such as domain shadowing are represented by the caution sign within a folder structure. Image includes Palo Alto Networks and Unit 42 logos.
64,844
people reacted

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • September 21, 2022 at 6:00 AM

80

7 min. read

Play Your Cards Right: Detecting Wildcard DNS AbuseA conceptual image representing attacks on DNS, including the Wildcard DNS abuse discussed here.
39,527
people reacted

Play Your Cards Right: Detecting Wildcard DNS Abuse

  • By Rebekah Houser and Daiping Liu
  • December 1, 2021 at 6:00 AM

20

10 min. read

A Peek into Top-Level Domains and CybercrimeA conceptual image related to the domain name system, in this case applied to an analysis of top-level domains and malicious content.
60,790
people reacted

A Peek into Top-Level Domains and Cybercrime

  • By Janos Szurdi
  • November 11, 2021 at 6:00 AM

35

11 min. read

Dangling Domains: Security Threats, Detection and PrevalenceA conceptual image representing exploitation of DNS, such as an often overlooked issue discussed in this blog, dangling domains, which can be exploited for DNS hijacking.
48,022
people reacted

Dangling Domains: Security Threats, Detection and Prevalence

  • By Daiping Liu and Ruian Duan
  • September 16, 2021 at 6:00 AM

25

12 min. read

DNS Rebinding Attack: How Malicious Websites Exploit Private NetworksA conceptual image representing issues with DNS, such as the DNS rebinding discussed here.
69,668
people reacted

DNS Rebinding Attack: How Malicious Websites Exploit Private Networks

  • By Zhanhao Chen
  • August 31, 2021 at 6:00 AM

42

13 min. read

Detecting and Preventing Malicious Domains Proactively with DNS SecurityA conceptual image representing malicious domains, such as those that can be identified by the proactive detector discussed in this piece.
40,004
people reacted

Detecting and Preventing Malicious Domains Proactively with DNS Security

  • By Zhanhao Chen and Daiping Liu
  • May 4, 2021 at 6:00 AM

23

11 min. read

Overview of dnsmasq Vulnerabilities: The Dangers of DNS Cache Poisoning
31,670
people reacted

Overview of dnsmasq Vulnerabilities: The Dangers of DNS Cache Poisoning

  • By Daniel Prizmant
  • March 8, 2021 at 9:00 AM

24

10 min. read

Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement TakedownsCybercriminals, conceptualized by this image of a man illicitly opening a door into a computer, use techniques such as fast flux, described here, to evade detection and law enforcement takedowns.
51,938
people reacted

Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns

  • By Janos Szurdi, Rebekah Houser and Daiping Liu
  • March 2, 2021 at 6:00 AM

54

13 min. read

The History of DNS Vulnerabilities and the CloudA conceptual image illustrating the concept of DNS vulnerabilities through a set of folders with one opened by an attacker.
43,946
people reacted

The History of DNS Vulnerabilities and the Cloud

  • By Daniel Prizmant
  • December 28, 2020 at 6:00 AM

44

14 min. read

DNS Tunneling: how DNS can be (ab)used by malicious actors
155,938
people reacted

DNS Tunneling: how DNS can be (ab)used by malicious actors

  • By Alex Hinchliffe
  • March 15, 2019 at 9:00 AM

38

11 min. read

New Wekby Attacks Use DNS Requests As Command and Control Mechanism

  • By Josh Grunzweig, Mike Scott and Bryan Lee
  • May 24, 2016 at 11:30 AM

12

6 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.