article thumbnail

Muddling Meerkat, a mysterious DNS Operation involving China’s Great Firewall

Security Affairs

The China-linked threat actors Muddling Meerkat are manipulating DNS to probe networks globally since 2019. Infoblox researchers observed China-linked threat actors Muddling Meerkat using sophisticated DNS activities since 2019 to bypass traditional security measures and probe networks worldwide. ” concludes the report.

DNS 141
article thumbnail

Microsoft Buys Corp.com

Schneier on Security

A core part of the way these things find each other involves a Windows feature called " DNS name devolution ," which is a kind of network shorthand that makes it easier to find other computers or servers without having to specify a full, legitimate domain name for those resources.

DNS 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Buys Corp.com So Bad Guys Can’t

Krebs on Security

A core part of the way these things find each other involves a Windows feature called “ DNS name devolution ,” which is a kind of network shorthand that makes it easier to find other computers or servers without having to specify a full, legitimate domain name for those resources.

DNS 359
article thumbnail

Global 2000 companies failing to adopt key domain security measures

CSO Magazine

Forbes Global 2000 companies are failing to adopt key domain security measures, exposing them to significant security risks, according to CSC’s Domain Security Report 2022. The data follows Akamai research from August , which discovered increased malicious domain activity and phishing toolkit reuse based on DNS data.

DNS 77
article thumbnail

Russia-linked APT Seashell Blizzard is behind the long running global access operation BadPilot campaign

Security Affairs

Seashell Blizzard (aka Sandworm , BlackEnergy and TeleBots ) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRUs Main Center for Special Technologies (GTsST). Since late 2021, the subgroup has targeted networks by modifying Outlook Web Access (OWA) sign-in pages and DNS configurations.

article thumbnail

83% of Forbes 2000 Companies' Web Domains Are Poorly Protected

Dark Reading

Only a handful have controls against domain-name hijacking, DNS modifications, and other threats, a new CSC study finds.

DNS 81
article thumbnail

‘Name:Wreck’ is the latest collision between TCP/IP and the standards process

SC Magazine

Name:Wreck adds a second layer of complexity – a common misinterpretation of the DNS standards involving memory pointers and message compression. . If you look at DNS, the original document is from 1983 and then there are several other scattered documents that talk about other ways to prevent problems.

DNS 108