Last week, Nozomi Networks released an advisory (tracked as CVE-2022-30295) detailing a vulnerability in the DNS component of uClibc library used in many IoT products.
Data collected from F5 Silverline – a cloud-based managed services platform that detects and mitigates DDoS attacks in real-time – revealed a 3% year-on-year decrease in the total volume of attacks recorded in 2021.
Infoblox’s GitHub repository has over 800 indications, including dangerous and suspicious domains, as well as legitimate domains that may be blacklisted by other vendors via automated analytics.
There shall be increased use of DNS-over-HTTPS (DoH) by malware because DoH provides an encrypted channel to the DoH server. DoH adoption is increasing and malware developers are more aware of it as a means to bypass security controls. ISPs and enterprises will deploy DoH defensively on their own DNS infrastructure Why now? DoH is a newer technology, relatively speaking.
The latest release of Riverbed AppResponse is targeted at relieving many of the everyday network issues organizations are experiencing with Zoom and Microsoft Teams, as well as common DNS and TCP issues.