The Domain Name System (DNS) plays a critical role in modern network connectivity. Unfortunately, it is also a central part of many cyberattacks. DNS is involved in more than 90% of malware and nearly half of all ransomware and data exfiltration incidents.

But exactly how do cybercrimals use DNS to carry out attacks?

Look Below the Surface

Join us for this live Infoblox Tech Tuesday webinar as we examine the many ways cybercriminals exploit the unique properties of DNS. Attend this session and discover:

    • The various phases in the intrusion kill chain and how DNS is used in each phase
    • The technical mechanisms behind DNS reconnaissance, protocol anomalies, exploits, hijacking, command and control (C&C) communications, DGA threats and more
    • How DNS-based attacks actually work—through real word examples, including malware, phishing campaigns, and advanced persistent threats (APTs)

Learn how DNS-based attacks operate—from the inside out.

Register for the Webinar!

Complete the form below to register for the webinar.