News & Updates

4 strategies to help reduce the risk of DNS tunneling

Domain name system (DNS) tunneling is a pervasive threat that enables hackers to get any data in and out of a company’s internal network while bypassing most firewalls. The domain name system translates numeric internet protocol addresses that browsers can then use to load web pages — threat actors use tunneling to exploit this process and steal data by hiding it inside DNS traffic.

Most DNS attacks focus on spoofing or misdirection, where an attacker either feeds false information to DNS servers or convinces other systems to query a hostile DNS server instead of a legitimate one. But DNS tunneling essentially smuggles hostile traffic through DNS ports, which makes these attacks difficult to detect and mitigate.

To read this article in full, please click here

News & Updates

Lazarus Hacker Group Evolves Tactics, Tools, and Targets in DeathNote Campaign

The North Korean threat actor known as the Lazarus Group has been observed shifting its focus and rapidly evolving its tools and tactics as part of a long-running activity called DeathNote.
While the nation-state adversary is known for its persistent attacks on the cryptocurrency sector, it has also targeted automotive, academic, and defense sectors in Eastern Europe and other parts of the world
News & Updates

Why Shadow APIs are More Dangerous than You Think

Shadow APIs are a growing risk for organizations of all sizes as they can mask malicious behavior and induce substantial data loss. For those that aren’t familiar with the term, shadow APIs are a type of application programming interface (API) that isn’t officially documented or supported. 
Contrary to popular belief, it’s unfortunately all too common to have APIs in production that no one on
News & Updates

Pakistan-based Transparent Tribe Hackers Targeting Indian Educational Institutions

The Transparent Tribe threat actor has been linked to a set of weaponized Microsoft Office documents in attacks targeting the Indian education sector using a continuously maintained piece of malware called Crimson RAT.
While the suspected Pakistan-based threat group is known to target military and government entities in the country, the activities have since expanded to include the education
Cybersecurity Tools

Secure Remote Access VPN: Everything You Need to Know

Learn about secure remote access VPNs with our comprehensive guide. Stay informed and keep your remote workforce protected. In today’s world, remote work has become increasingly common, and secure remote access has become essential for businesses of all sizes. With sensitive business data being accessed from outside the traditional office network, companies need to ensure […]

The post Secure Remote Access VPN: Everything You Need to Know appeared first on SecureBlitz Cybersecurity.

News & Updates

Need for privacy. To what extent are you willing to trade your data for content personalization?

Privacy is top of mind for most internet users these days, with 66% of consumers
around the world feeling tech companies have too much control over their
personal data, as shown in YouGov surveys in 17 countries (YouGov
[https://today.yougov.com/topics/technology/articles-reports/2021/03/31/privacy-and-big-tech-gauging-attitudes-around-worl]
). Adults in Spain (75%), the United Kingdom (75%), and the United States (72%)
are most likely to voice worry over control of their personal data.

But som

Scroll to Top