DNSChanger and the Global Scope of Cybersecurity

In November 2011, the FBI-led Operation Ghost Click raided malicious servers run by the Rove Digital cyber group. This was only after the group had leveraged the DNSChanger Trojan to infect over four million computers and generate over $14 million in illicit profits. At the time, the operation was billed as the biggest cyber criminal […]

The post DNSChanger and the Global Scope of Cybersecurity appeared first on Security Intelligence.

Continue reading DNSChanger and the Global Scope of Cybersecurity

Zero Trust and DNS Security: Better Together

How many times have you heard the popular information security joke: “It’s always DNS”? It means that every time there’s a problem you can’t figure out, you will dig until you reach the conclusion that it’s always DNS. But DNS is also where a lot of issues can be caught early, and it should be […]

The post Zero Trust and DNS Security: Better Together appeared first on Security Intelligence.

Continue reading Zero Trust and DNS Security: Better Together

Threat Intelligence Is the SOC’s Road Map to DNS Security

Threat intelligence provides the context SOC analysts need to proactively identify DNS security threats and prevent future DNS attacks.

The post Threat Intelligence Is the SOC’s Road Map to DNS Security appeared first on Security Intelligence.

Continue reading Threat Intelligence Is the SOC’s Road Map to DNS Security

Finding New Approaches to Web Application Security

Because so much is centered on web services and similar technology nowadays, web application security must be a high priority within any security system.

The post Finding New Approaches to Web Application Security appeared first on Security Intelligence.

Continue reading Finding New Approaches to Web Application Security

Application Security Takeaways From the Ai4 Cybersecurity Conference

While AI in cybersecurity is still in its infancy, the inaugural Ai4 Cybersecurity conference was a great first step in advancing the discussion, especially as it relates to application security.

The post Application Security Takeaways From the Ai4 Cybersecurity Conference appeared first on Security Intelligence.

Continue reading Application Security Takeaways From the Ai4 Cybersecurity Conference

Missed DNS Flag Day? It’s Not Too Late to Upgrade Your Domain Security

Whether or not you plan on using DNS cookies or DNSSEC, foreseeing an upgrade plan for your software to the latest version made available as part of DNS Flag Day is highly advised.

The post Missed DNS Flag Day? It’s Not Too Late to Upgrade Your Domain Security appeared first on Security Intelligence.

Continue reading Missed DNS Flag Day? It’s Not Too Late to Upgrade Your Domain Security

5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics

By understanding the basics of DNS analytics, the common methods of attack and the tools available to security teams, you will be better prepared to protect your enterprise from hidden cyberthreats.

The post 5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics appeared first on Security Intelligence.

Continue reading 5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics

How to Stay One Step Ahead of Phishing Websites — Literally

Ahead-of-threat detection enables security professionals and consumers to identify potential phishing websites faster than traditional browser protection apps can blacklist active cyberthreats.

The post How to Stay One Step Ahead of Phishing Websites — Literally appeared first on Security Intelligence.

Continue reading How to Stay One Step Ahead of Phishing Websites — Literally

Orchestrating Incident Response Beyond Triage and Enrichment

Incident response orchestration can help security teams transform response across the entire incident life cycle, including automating remedial actions and mitigating future attacks.

The post Orchestrating Incident Response Beyond Triage and Enrichment appeared first on Security Intelligence.

Continue reading Orchestrating Incident Response Beyond Triage and Enrichment

How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries

Using unique methods of analyzing DNS data, advanced DNS analytics enables security teams to quickly and proactively find and eliminate potential threats.

The post How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries appeared first on Security Intelligence.

Continue reading How to Use DNS Analytics to Find the Compromised Domain in a Billion DNS Queries