Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat intelligence, DNS detection and response, and DNS firewall: The future-proof defense every network needs

When it comes to incident response, every network admin knows the drill—endpoints trip alarms, firewalls block traffic, SOC dashboards light up with alerts. But the real story almost always starts earlier—in DNS. Long before malware detonates or data leaves the building, an attack whispers its intent in a query. Newly registered domains, fast-flux campaigns, suspicious TXT lookups—in all of these actions, DNS is where adversaries test the waters.

DDI Central 5.5 is here-with DNS threat intelligence, OpManager Plus integration, and more!

We’re excited to announce the launch of DDI Central version 5.5, a release shaped by the most demanded features from our customers and the ever-growing need for stronger security at the core of enterprise networks. With this version, the spotlight is on security, resiliency, and device-diagnostics driven IP address management.

DNS Tunneling: The Blind Spot in Your Network Security Strategy

The Domain Name System (DNS) is a critical component of internet infrastructure, responsible for translating human-readable domain names into IP addresses. However, the ubiquitous nature and often-overlooked security aspects of DNS make it a prime target for malicious actors. This blog post investigates the tools used for data exfiltration over DNS, the techniques involved, and the countermeasures to mitigate these threats.

Remote DNS Manipulation at Scale: How IONIX Uncovered 20,000 Malicious Subdomains from a Single Abused NS Record

Our threat-hunting team just uncovered a mass-produced remote DNS-manipulation campaign that hijacked an entire nameserver (NS) delegation belonging to a Fortune 500 company. Within hours, the attacker used that foothold to create over 9,500 brand-new subdomains, all resolving to the same criminal infrastructure serving illicit gambling pages.

How CleanINTERNET DNS Stops DNS Tunneling Before It Starts

Modern cyber threats are increasingly stealthy. A favorite tactic? DNS tunneling—a method used to bypass traditional network security controls by hiding malicious traffic inside DNS queries and responses. This can be done by embedding or encoding command and control instructions or data within subdomains or DNS record fields like TXT, CNAME or other rarely used record types.

Top DNS resolver security threats you can't ignore in 2025: Expert guide and prevention tips

DNS is often referred to as the internet’s phonebook, translating human-readable domain names into IP addresses. But this essential service also makes DNS a prime target for cyberattackers. With the increasing volume and sophistication of DNS-based threats, including DNS spoofing, cache poisoning, and DDoS attacks, it’s crucial to understand the risks involved.

Onboarding DNS with Cloudflare

A step-by-step walkthrough on how to onboard your DNS to Cloudflare. Learn how to seamlessly migrate, optimize performance and enhance security using Cloudflare’s powerful DNS features. Our expert will guide you through best practices, common pitfalls and advanced configurations to ensure a smooth transition. Whether you're new to Cloudflare or looking to refine your setup, this session will equip you with the knowledge to maximize reliability and speed.

How to Prevent Phishing and Account Takeover from DNS Cache Poisoning in Real Time

For security teams, it’s no great revelation to say that DNS cache poisoning prevention is essential for guarding against attacks using that vector. But it’s easier said than done. While traditional network-layer defenses like DNSSEC reduce poisoning risk, they can’t fully prevent it. Downstream – after redirection – bad actors await, ready to harvest credentials, bypass MFA, and take over accounts.

DNS Security: Today's Most Common DNS Risks and Threats

Domain Name System (DNS) is a critical Internet service. DNS simplifies the process of finding Internet resources by resolving user-friendly domain names, such as splunk.com, into machine-readable IP addresses like 192.168.1.1. Many sophisticated cyberattacks rely on DNS activities. Let’s review the risks DNS services face and what organizations can do to guard against DNS attacks. We’ll cover the following critical DNS security topics.

CyCognito Integrates with Cloudflare for Direct Access to DNS

CyCognito is always seeking additional methods to discover customer external-facing assets. One such resource is an integration with content delivery network (CDN) management systems. Many organizations manage most or all their DNS records with CDNs, as they provide IT and security teams with centralized management visibility.