DNS Tunneling: how DNS can be (ab)used by malicious actors 177,702 people reacted DNS Tunneling: how DNS can be (ab)used by malicious actors By Alex Hinchliffe March 15, 2019 at 9:00 AM 43 11 min. read
New Wekby Attacks Use DNS Requests As Command and Control Mechanism By Josh Grunzweig, Mike Scott and Bryan Lee May 24, 2016 at 11:30 AM 12 6 min. read
Don’t Be an April Fool: Inside a Common Phone Scam By Robert Falcone and Simon Conant April 1, 2016 at 2:00 PM 7 8 min. read
Connecting the Dots in Cyber Threat Campaigns, Part 2: Passive DNS By Bryan Lee November 4, 2015 at 3:30 PM 7 6 min. read