article thumbnail

Muddling Meerkat, a mysterious DNS Operation involving China’s Great Firewall

Security Affairs

The China-linked threat actors Muddling Meerkat are manipulating DNS to probe networks globally since 2019. Infoblox researchers observed China-linked threat actors Muddling Meerkat using sophisticated DNS activities since 2019 to bypass traditional security measures and probe networks worldwide. ” concludes the report.

DNS 123
article thumbnail

Global 2000 companies failing to adopt key domain security measures

CSO Magazine

Forbes Global 2000 companies are failing to adopt key domain security measures, exposing them to significant security risks, according to CSC’s Domain Security Report 2022. The data follows Akamai research from August , which discovered increased malicious domain activity and phishing toolkit reuse based on DNS data.

DNS 77
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

83% of Forbes 2000 Companies' Web Domains Are Poorly Protected

Dark Reading

Only a handful have controls against domain-name hijacking, DNS modifications, and other threats, a new CSC study finds.

DNS 81
article thumbnail

Microsoft Buys Corp.com

Schneier on Security

A core part of the way these things find each other involves a Windows feature called " DNS name devolution ," which is a kind of network shorthand that makes it easier to find other computers or servers without having to specify a full, legitimate domain name for those resources.

DNS 361
article thumbnail

Microsoft Buys Corp.com So Bad Guys Can’t

Krebs on Security

A core part of the way these things find each other involves a Windows feature called “ DNS name devolution ,” which is a kind of network shorthand that makes it easier to find other computers or servers without having to specify a full, legitimate domain name for those resources.

DNS 325
article thumbnail

‘Name:Wreck’ is the latest collision between TCP/IP and the standards process

SC Magazine

Name:Wreck adds a second layer of complexity – a common misinterpretation of the DNS standards involving memory pointers and message compression. . If you look at DNS, the original document is from 1983 and then there are several other scattered documents that talk about other ways to prevent problems.

DNS 108
article thumbnail

Companies Failing to Protect Domain Registrations

Security Boulevard

The study found the majority of Global 2000 companies continue to lag in the adoption of domain security. The post Companies Failing to Protect Domain Registrations appeared first on Security Boulevard.

Phishing 119