Threat Intelligence
Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools & technologies.
The letters "DNS" within a jagged circle in the center of various technology icons with a blurred finger pointing to it
Cyberattacks & Data BreachesDNS Tunneling Abuse Expands to Tracking & Scanning VictimsDNS Tunneling Abuse Expands to Tracking & Scanning Victims
Several campaigns are leveraging the evasive tactic to provide useful insights into victims' online activities and find new ways to compromise organizations.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.