News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Android malware infects WiFi routers and cell phones 
Kaspersky_news

A new DNS-changing Android malware allows cybercriminals to infect Android smartphones with malware via compromised Wi-Fi routers in cafes, airport hotels and other public places. Many users in South Korea are currently being infected, but the malware is spreading more and more in Germany and Austria via smishing. Kaspersky experts report. Roaming Mantis recently introduced DNS (Domain Name System) changer functionality in Wroba.o malware, also known as Agent.eq, Moqhao and XLoader - the malware is a core part of the campaign. DNS-Changer is a malicious program that steals the device connected to a compromised WiFi router…

Read more

Danger check: self-hacking tool for companies
Danger check: self-hacking tool for companies

A new, free self-hacking tool allows companies to safely hack their own network and check their DNS security. EfficientIP introduces the tool for detecting the risk of data exfiltration in companies. The free self-hacking tool, a DNS-based data exfiltration application, is free for companies to use. Designed as an easy-to-use online tool, the application enables organizations to easily and securely conduct their own 'ethical hack' of their DNS systems and associated security measures. In this way, vulnerabilities can be uncovered that lead to a greater security gap in the network and thus also to a data leak...

Read more

Domain Shadowing - DNS Compromise for Cybercrime
Domain Shadowing - DNS Compromise for Cybercrime

Cyber ​​criminals compromise domain names in order to attack domain owners or users directly, or use them for various nefarious ventures such as phishing, malware distribution, and command-and-control (C2) operations. A special case of DNS hijacking is known as domain shadowing, where attackers secretly create malicious subdomains under compromised domain names. Shadow domains do not affect the normal operation of the compromised domains, making them difficult to detect by victims. The inconspicuousness of this subdomain often enables the perpetrators to exploit the good reputation of the compromised domain for a long time....

Read more

DNS-based protection for telcos and ISPs
Eset_News

ESET NetProtect: DNS-based protection offers real value for mobile operators and ISPs - Internet providers. The security solution, specially tailored for telcos and ISPs, protects customers at the push of a button in domestic and mobile networks. The European IT security manufacturer ESET has released a new product range for mobile network operators and Internet providers (Telco and ISP) to offer users even more comprehensive protection. Cybercrime is and will remain an ongoing problem, as ESET researchers also show in their latest threat report. Digital attacks are increasing every day and smartphones are currently particularly affected. The ESET NetProtect solution, specially tailored for telcos and ISPs...

Read more

AI-based whitelist DNS filter
AI-based whitelist DNS filter

Dynamically learning DNS blocker stops threats in real time before they reach the network. ProSoft presents Blue Shield Umbrella: The world's first AI-based whitelist DNS filter. The Domain Name System (DNS) makes the Internet really usable for users. DNS converts website calls into IP addresses and forwards user requests to the target server. But: DNS is not encrypted and therefore a potential weak point for every computer and thus every company network. Unencrypted DNS is vulnerable There is a high risk potential, for example, from the intrusion of malware and zero-day malicious code, but also from fake websites for…

Read more

Errors in the DNS configuration lead to failures
F5 news

Most corporate DNS problems arise from misconfiguration. Roman Borovits, Senior Systems Engineer DACH at F5, describes the most common errors and simple protective measures for the DNS. The Domain Name System (DNS) is one of the most important protocols on the Internet. It is often boldly referred to as the “Internet phone book”. In fact, DNS is a decentralized directory with which individual host names such as “www.f5.com” are translated into an IP address such as “18.66.122.15”. Small mistake - big effect So it is clear: If there is a problem with the service, find ...

Read more