Infoblox certificates Datadog Web3 DNSSEC OPSWAT web application security

Infoblox Applies AI to DNS Traffic to Thwart Malware Infestations

Infoblox is leveraging AI to identify websites that are sources of malware and block them to make IT environments more secure ...
Security Boulevard
A caricature of Russian president-for-life Vladimir Vladimirovich Putin, with superimposed text “no .ru for you”

Russian Internet Outage: DNSSEC Oops or Ukraine Hack?

It was DNS. It’s always DNS: Government ministry denies hackers hacked its network infrastructure ...
Security Boulevard
Understanding and protecting against DNS threats with Avast

Understanding and protecting against DNS threats with Avast

| | dns, security
Welcome to the digital age, where the internet is as essential as the air we breathe. But did you know that every time you visit a website, there's a hidden hero working ...
How Service Providers Can Implement DoH Cost Effectively

How Service Providers Can Implement DoH Cost Effectively

DoH, or DNS over HTTP/S, is a secure protocol that facilitates encrypted DNS resolution through an HTTPS connection. Unlike traditional DNS resolution methods that utilize unencrypted TCP or UDP connections, DoH offers ...
DNS Security and SASE: Extending Security and Zero Trust to the New Network Perimeter

DNS Security and SASE: Extending Security and Zero Trust to the New Network Perimeter

DNS stands for Domain Name System, and acts as the “phone book of the internet”, turning IP addresses, such as 157.240.22.35 into Fully Qualified Domain Names (or FQDNs), such as Facebook.com ...
DNS-Based Threats and Their Impact on Business

DNS-Based Threats and Their Impact on Business

By Kerry McQuarrie, SOC Manager, CISO Global, Inc. A Domain Name System (DNS) is a protocol that translates human-readable domain names/URLs—like favoritewebsite.com—into IP addresses that computers can read—like 135.24.56.98. DNS servers handle ...
Shaft Silhouette with Can You Dig It below

“Bizarre” DNS Hacks For Fun And, Um…, Fun

| | dns, Go, golang, hacks
I’ve been (slowly) making my way through FOSDEM `23 presentations and caught up to Peter Lowe‘s “Bizarre and Unusual Uses of DNS • Rule 53: If you can think of it, someone’s ...
How to: Basics of Using Safing Portmaster

How to: Basics of Using Safing Portmaster

This post was originally published on 1 FEB 2023; it has since been updated and revised. In this guide we look at how to get familiar with using/tweaking Safing Portmaster, an open-source ...
Edgeless digital immunity, digital security, confidential Oracle recovery gateway, security

Why API Gateways are Critical for Cloud Security

What is an API gateway? APIs are an important part of the information economy, allowing applications to communicate with each other, and sharing functionality and data. An API gateway is middleware that ...
Security Boulevard
Avoid The Hack: The Best Pi-Hole Blocklists (2024)

Avoid The Hack: The Best Pi-Hole Blocklists (2024)

| | dns, pihole
This post was originally published on 26 APR 2021; it has since been updated and revised. Looking for solid and maintained blocklists to round out the blocking capabilities of your Pi-Hole install? ...