article thumbnail

alphaMountain has launched a new Cyber Threat analysis platform called “threatYeti”

CyberSecurity Insiders

alphaMountain has launched a new platform called “threatYeti,” designed to aid cyber threat analysts, security researchers, and in-house security operations teams with domain research.

article thumbnail

Why Small and Medium Sized Businesses Need More Than Just an AntiVirus Solution

Security Boulevard

Thankfully, nearly all malware depends on DNS at some point in their kill chain, making the protocol a critical vector for shutting down these threats. Some of the common forms these DNS-based attacks can take include: DNS spoofing: A malicious actor alters DNS records to redirect traffic to a fake website or server.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stories from the SOC – DNS recon + exfiltration

CyberSecurity Insiders

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. The post Stories from the SOC – DNS recon + exfiltration appeared first on Cybersecurity Insiders.

DNS 54
article thumbnail

Proactive Intelligence: A Paradigm Shift In Cyber Defense

Security Boulevard

Traditionally, cybersecurity has been a reactive game: We respond to cyber threats as they arise, analyze the incidents, add pertinent information to “deny lists”, and update stakeholders on “what happened.” That's where technologies like protective DNS come in. It may sound difficult, but change always sounds hard at first.

DNS 86
article thumbnail

Strengthening Cyber Resilience: A Milestone Partnership

Security Boulevard

The timing of this collaboration is particularly significant, given the escalating cyber threats facing organizations across the region. With cyber attacks becoming increasingly sophisticated and frequent, there is an urgent need for proactive defense mechanisms that adapt to evolving threats in real-time.

article thumbnail

E-mail header analysis

CyberSecurity Insiders

SPF: also known as Sender Policy Framework, is a DNS record used for authentication mechanism in email addresses. SPF is a txt record configured in DNS records. For configuring DMARC to DNS records, SPF and DKIM configuration is mandatory. Metadata: Metadata is kind of data which provides information about the other data.

DNS 107
article thumbnail

Attack Surface Management for the Adoption of SaaS

CyberSecurity Insiders

DNS subdomain scanning is a useful tactic to discover internet-exposed SaaS application portals and their APIs. Monitoring/Threat Detection. Security threat detection and monitoring in SaaS is hit or miss. However, taking an outside-in approach to SaaS discovery can help.