article thumbnail

German encrypted email service Tutanota suffers DDoS attacks

Security Affairs

The popular encrypted email service Tutanota was hit with a series of DDoS attacks this week targeting its website fist and its DNS providers later. Encrypted email service, Tutanota suffered a series of DDoS attacks that initially targeted the website and later its DNS providers. ” continues the post.

DDOS 136
article thumbnail

Alleged Iran-linked APT groups behind global DNS Hijacking campaign

Security Affairs

Security expert uncovered a DNS hijacking campaign targeting organizations in various industries worldwide and suspects Iranian APT groups. It is interesting to note that FireEye confirmed that this campaign is different from other operations carried out by Iranian APT groups due to the use of DNS hijacking at scale.

DNS 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Future Focused: A Safer Way to Expose Private Server Names

Cisco Security

Shrink the DNS attack surface with Auth-DoH. In this analogy, the invisibility superpower is DNS over HTTPS (DoH). It’s a new protocol that encrypts the DNS request to keep bad actors from discovering or altering domain names or snooping on users’ internet destinations. My inspiration: Loki , the Marvel superhero.)

DNS 105
article thumbnail

Some Fortinet products used hardcoded keys and weak encryption for communications

Security Affairs

Researchers at SEC Consult Vulnerability Lab discovered multiple issues in several security products from Fortinet, including hardcoded key and encryption for communications. “ Fortinet products, including FortiGate and Forticlient regularly send information to Fortinet servers (DNS: guard.fortinet.com) on. Pierluigi Paganini.

article thumbnail

Let’s Encrypt CA is revoking over 3 Million TLS certificates due to a bug

Security Affairs

Let’s Encrypt is going to revoke over 3 million certificates today due to a flaw in the software used to verify users and their domains before issuing a certificate. A bug in Let’s Encrypt’s certificate authority (CA) software, dubbed Boulder, caused the correct validation for some certificates.

article thumbnail

Cisco Interop: Discovery of Designated Resolvers Protocol Implemented

Cisco Security

Auth-DoH is essentially a safer way to publicly advertise private services. It’s a forward-looking idea to improve DNS security. DDR allows for upgrading from insecure DNS to secure DNS. First, the network still acts as a policy enforcement point and secondly DNS is more secure for both the enterprise and end user.

DNS 106
article thumbnail

VPN Test: How to check if your VPN is working or not

Malwarebytes

Because you have to tell all the websites and services you use what your IP address is, it can be used by advertising and tracking services to track you across the web, either on its own or as part of a fingerprint. In particular it stops them looking at your DNS traffic, which can reveal which websites you’re visiting.

VPN 102