Tag: dns
-
Ransomware-Bande missbraucht Microsoft-Zertifikate
Kontinuierlich offenstehende Hintertüren sind für Cyberkriminelle ein Freifahrtschein.Die Ransomware-Bande Rhysida ist speziell im Unternehmensumfeld berüchtigt. Nun scheint das kriminelle Hacker-Kollektiv neue Wege einschlagen zu wollen, wie ein Bericht des US-Sicherheitsanbieters Expel nahelegt. Demnach setzen die Cyberkriminellen in ihrer aktuellen Angriffskampagne initial auf Malvertising. Die maliziösen Anzeigen laufen über die Microsoft-Suchmaschine Bing und führen auf Fake-Download-Seiten…
-
Rhysida ransomware exploits Microsoft certificate to slip malware past defenses
Identifying forensic signals: The campaigns that leverage trusted certificates undermine the trust model enterprises rely on. Signed malware bypasses app-allow lists, browser warnings, OS checks, and antivirus assumptions about signed code. When the file poses as Teams or PuTTY, employees don’t hesitate to download it as it looks normal.”Once inside, the malware runs with fewer…
-
Rhysida ransomware exploits Microsoft certificate to slip malware past defenses
Identifying forensic signals: The campaigns that leverage trusted certificates undermine the trust model enterprises rely on. Signed malware bypasses app-allow lists, browser warnings, OS checks, and antivirus assumptions about signed code. When the file poses as Teams or PuTTY, employees don’t hesitate to download it as it looks normal.”Once inside, the malware runs with fewer…
-
Rhysida ransomware exploits Microsoft certificate to slip malware past defenses
Identifying forensic signals: The campaigns that leverage trusted certificates undermine the trust model enterprises rely on. Signed malware bypasses app-allow lists, browser warnings, OS checks, and antivirus assumptions about signed code. When the file poses as Teams or PuTTY, employees don’t hesitate to download it as it looks normal.”Once inside, the malware runs with fewer…
-
Proof of Concept für Angriff auf weitverbreitete DNS-Lösung öffentlich – Schwachstelle in BIND ausnutzbar
First seen on security-insider.de Jump to article: www.security-insider.de/gefaehrliche-sicherheitsluecken-bind-dns-server-software-a-29d7fa8b2275c3c28fbe052a314b9ca2/
-
Week in review: WSUS vulnerability exploited to drop Skuld infostealer, PoC for BIND 9 DNS flaw published
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Can your earbuds recognize you? Researchers are working on it Biometric … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/02/week-in-review-wsus-vulnerability-exploited-to-drop-skuld-infostealer-poc-for-bind-9-dns-flaw-published/
-
Preventing DNS filtering bypass by Encrypted DNS (DoT, DoH, DoQ)
DNS over HTTPS (DoH) and other encrypted DNS protocols like DNS over TLS (DoT) & DNS over QUIC (DoQ) enhances user privacy and security by encrypting DNS queries in transit, shielding them from eavesdropping, tampering, and censorship on untrusted networks. This prevents ISPs and local attackers from logging or manipulating domain resolutions, fostering a more…
-
Defending DNS with Infoblox and Protective DNS
For too long, we’ve treated DNS as a simple utility. It’s just a phonebook for the internet, right? Treating it that way is a mistake. Nearly every single malicious action, whether it’s a phishing link, a command-and-control (C2) callback, or data exfiltration, starts with a DNS query. It is integral to the attacker workflow. So,..…
-
Zensur- und werbefrei durchs Netz: Schritt-für-Schritt-Anleitung
Tags: dnsZensur- und werbefrei durchs Netz mit eigenem DNS-Server mit Technitium, AdGuard und Tailscale. Wir erklären, wie man den Server aufsetzt. First seen on tarnkappe.info Jump to article: tarnkappe.info/tutorials/zensur-und-werbefrei-durchs-netz-schritt-fuer-schritt-anleitung-322371.html
-
Zensur- und werbefrei durchs Netz: Schritt-für-Schritt-Anleitung
Tags: dnsZensur- und werbefrei durchs Netz mit eigenem DNS-Server mit Technitium, AdGuard und Tailscale. Wir erklären, wie man den Server aufsetzt. First seen on tarnkappe.info Jump to article: tarnkappe.info/tutorials/zensur-und-werbefrei-durchs-netz-schritt-fuer-schritt-anleitung-322371.html
-
Public Exploit Code Released for Critical BIND 9 DNS Vulnerability
A public exploit for a critical BIND 9 flaw renews DNS cache-poisoning risk, enabling forged records and traffic redirection. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/public-exploit-code-released-for-critical-bind-9-dns-vulnerability/
-
Microsoft Azure Cloud Apps Shut Down by Configuration Error
Azure Outage Comes a Week After a Cloud DNS Error Disrupted AWS Users. Microsoft’s Azure cloud and 365 systems suffered an outage at noon on Wednesday because of a configuration error – hours before its quarterly earnings call and about a week after rival AWS underwent a widespread outage that shut down applications and services…
-
ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising
The comfort zone in cybersecurity is gone. Attackers are scaling down, focusing tighter, and squeezing more value from fewer, high-impact targets. At the same time, defenders face growing blind spots — from spoofed messages to large-scale social engineering.This week’s findings show how that shrinking margin of safety is redrawing the threat landscape. Here’s what’s First…
-
Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide
Microsoft experienced a widespread service outage on Wednesday, October 29, 2025, affecting its Azure cloud platform and Microsoft 365 suite, leaving thousands of users unable to access critical business services. The disruption, which began around 16:00 UTC (approximately 9:30 PM IST), was attributed to Domain Name System (DNS) configuration issues that crippled connectivity across Microsoft’s…
-
DNS outage impacts Azure and Microsoft 365 services
Microsoft is suffering an ongoing DNS outage affecting customers worldwide, preventing them from logging into company networks and accessing Microsoft Azure and Microsoft 365 services. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-dns-outage-impacts-azure-and-microsoft-365-services/
-
DNS outage impacts Azure and Microsoft 365 services
Microsoft is suffering an ongoing DNS outage affecting customers worldwide, preventing them from logging into company networks and accessing Microsoft Azure and Microsoft 365 services. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-dns-outage-impacts-azure-and-microsoft-365-services/
-
SOA Expire Value Out of Recommended Range: What It Means and How to Fix It
Tags: dnsSeeing the “SOA expire value out of recommended range” warning? Learn what it means, the recommended range for SOA expire values, and how to fix this DNS configuration issue easily. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/soa-expire-value-out-of-recommended-range-what-it-means-and-how-to-fix-it/
-
SOA Expire Value Out of Recommended Range: What It Means and How to Fix It
Tags: dnsSeeing the “SOA expire value out of recommended range” warning? Learn what it means, the recommended range for SOA expire values, and how to fix this DNS configuration issue easily. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/soa-expire-value-out-of-recommended-range-what-it-means-and-how-to-fix-it/
-
BSI warnt vor Bind-Lücke: Daten unzähliger DNS-Server manipulierbar
Angreifer können via Cache-Poisoning Datenverkehr auf eigene Domains umleiten. Allein in Deutschland sind laut BSI rund 40.000 DNS-Server anfällig. First seen on golem.de Jump to article: www.golem.de/news/exploit-code-verfuegbar-dns-eintraege-unzaehliger-bind-server-manipulierbar-2510-201636.html
-
Exploit-Code verfügbar: DNS-Einträge unzähliger Bind-Server manipulierbar
Angreifer können via Cache-Poisoning Datenverkehr auf eigene Domains umleiten. Allein in Deutschland sind laut BSI rund 40.000 DNS-Server anfällig. First seen on golem.de Jump to article: www.golem.de/news/exploit-code-verfuegbar-dns-eintraege-unzaehliger-bind-server-manipulierbar-2510-201636.html
-
Atroposia malware kit lowers the bar for cybercrime, and raises the stakes for enterprise defenders
Tags: apt, authentication, automation, ciso, credentials, crime, cybercrime, defense, detection, dns, endpoint, infrastructure, mail, malicious, malware, mfa, monitoring, rat, service, spam, threat, tool, update, vulnerabilityRAT toolkits proliferating: Atroposia is one of a growing number of RAT tools targeting enterprises; Varonis has also recently discovered SpamGPT and MatrixPDF, a spam-as-a-service platform and malicious PDF builder, respectively.Shipley noted that these types of packages which identify additional avenues to maintain persistence have been around for some time; Mirai, which goes back to…
-
PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778)
A high-severity vulnerability (CVE-2025-40778) affecting BIND 9 DNS resolvers could be leveraged by remote, unauthenticated attackers to manipulate DNS entries via cache … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/28/bind-9-vulnerability-cve-2025-40778-poc/
-
Pi-hole XSS CVE-2025-53533: kritische Sicherheitslücke entdeckt
Pi-hole XSS CVE-2025-53533. In der DNS-Software in der Weboberfläche. Der Template-Fehler im Webfrontend kann gravierende Folgen haben. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/cyberangriffe/pi-hole-xss-cve-2025-53533-kritische-sicherheitsluecke-entdeckt-322254.html
-
New BIND 9 Security Flaw (CVE-2025-40778) Threatens Global DNS Infrastructure
A newly disclosed security flaw has put more than 706,000 BIND 9 DNS resolvers worldwide at risk of cache poisoning attacks, according to an advisory published by the Internet Systems Consortium (ISC) on October 22, 2025. The vulnerability, identified as CVE-2025-40778, carries a CVSS v3.1 severity score of 8.6 (High) and could enable remote attackers to inject forged DNS records into resolver caches.…
-
It’s Always DNS: Lessons from the AWS Outage
In episode 404 (no pun intended!) we discuss the recurring issue of DNS outages, the recent Amazon AWS disruption, and what this reveals about our dependency on cloud services. The conversation touches on the need for tested business continuity plans, the implications of DNS failures, and the misconceptions around cloud infrastructure’s automatic failover capabilities. **……
-
706,000+ BIND 9 DNS Resolvers Exposed to Cache Poisoning PoC Released
A critical vulnerability affecting more than 706,000 BIND 9 DNS resolvers worldwide has been disclosed with proof-of-concept exploit code now publicly available. The security flaw enables attackers to perform cache poisoning attacks by injecting malicious DNS records into vulnerable resolver caches, potentially redirecting users to attacker-controlled infrastructure. The vulnerability, tracked as CVE-2025-40778, was disclosed by…
-
A single DNS race condition brought Amazon’s cloud empire to its knees
Fault in DynamoDB system cascaded through AWS services, knocking major sites offline for hours First seen on theregister.com Jump to article: www.theregister.com/2025/10/23/amazon_outage_postmortem/
-
Amazon: This week’s AWS outage caused by major DNS failure
Amazon says a major DNS failure was behind a massive AWS (Amazon Web Services) outage that took down many websites and online services on Monday. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/technology/amazon-this-weeks-aws-outage-caused-by-major-dns-failure/
-
Amazon Reveals Technical Fault Behind Widescale AWS Service Outage
Amazon Web Services experienced a major outage that affected millions of customers and Amazon’s own operations on October 19 and 20, 2025. The company has now confirmed that a DNS resolution issue with regional DynamoDB service endpoints was the root cause of the disruption, which lasted approximately two hours and thirty-five minutes. What Went Wrong…
-
Cloud-Panne: AWS führt weltweite Ausfälle auf eine Race Condition zurück
Die Race Condition ist in einem fehlerhaften DNS-Eintrag gemündet – mit den bekannten Auswirkungen, die sich weltweit bemerkbar machten. First seen on golem.de Jump to article: www.golem.de/news/cloud-panne-aws-fuehrt-weltweite-ausfaelle-auf-eine-race-condition-zurueck-2510-201498.html

