Remove 2019 Remove Blog Remove DNS Remove Firewall
article thumbnail

GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

The Last Watchdog

In 2019, we’ve seen a surge in domain name service (DNS) hijacking attempts and have relayed warnings from the U.S. In the enterprise environment, domain names, DNS, and certificates are the lifeline to any internet-based application including websites, email, apps, virtual private networks (VPNs), voice over IP (VoIP) and more.

DNS 182
article thumbnail

Black Hat USA 2021 Network Operations Center

Cisco Security

This requires a robust connection to the Internet (Lumen and Gigamon), firewall protection (Palo Alto Networks), segmented wireless network (Commscope Ruckus) and network full packet capture & forensics and SIEM (RSA NetWitness); with Cisco providing cloud-based security and intelligence support. From Russia With Love. Recorded Future.

DNS 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Future Focused: Encryption and Visibility Can Co-Exist

Cisco Security

In fact, 63% of threats detected by Cisco Stealthwatch in 2019 were in encrypted traffic. In this blog I’ll describe two recent privacy advances—DNS over HTTPS (DoH) and QUIC—and what we’re doing to maintain visibility. Keeping your destination private: DNS over HTTPS. Until recently, DNS messages were sent in the clear.

article thumbnail

French Firms Rocked by Kasbah Hacker?

Krebs on Security

HYAS said it quickly notified the French national computer emergency team and the FBI about its findings, which pointed to a dynamic domain name system (DNS) provider on which the purveyors of this attack campaign relied for their various malware servers. ‘FATAL’ ERROR.

DNS 256
article thumbnail

Threat Protection: The REvil Ransomware

Cisco Security

We looked at REvil, also known as Sodinokibi or Sodin, earlier in the year in a Threat Trends blog on DNS Security. In it we talked about how REvil/Sodinokibi compromised far more endpoints than Ryuk, but had far less DNS communication. Figure 1-DNS activity surrounding REvil/Sodinokibi. Changing firewall rules.

article thumbnail

SOCwise Series: Practical Considerations on SUNBURST

McAfee

This blog is part of our SOCwise series where we’ll be digging into all things related to SecOps from a practitioner’s point of view, helping us enable defenders to both build context and confidence in what they do. . And they didn’t even give it a DNS look up until almost a year later.

DNS 102
article thumbnail

Abusing cloud services to fly under the radar

Fox IT

NCC Group and Fox-IT observed this threat actor during various incident response engagements performed between October 2019 until April 2020. The more recent intrusions took place in 2019 at companies in the aviation industry. observed Q2 2017 Cobalt Strike v3.12, observed Q3 2018 Cobalt Strike v3.14, observed Q2 2019.

VPN 68