ThreatTalk Season 3 Episode 24 | Navigating the Evolving Cybersecurity Channel Partner Landscape
Show Me the Value: Understanding the Landscape
Show Me the Value: Understanding the Landscape
In April 2023, Infoblox disclosed the discovery of Decoy Dog, a malware toolkit that uses the domain name system (DNS) to perform command and control (C2). Decoy Dog had operated…
, Decisions: Vulnerable, exploitable, patchable or possibly ignorable?
Get to combat your cybersecurity skill shortage
Since the inception of DNS, cyber attacks that leverage the protocol have mushroomed. More than 90% of malware uses DNS in some form. The ubiquity of DNS, coupled with its…
Gathering data about ongoing cyberattacks can help security teams improve their defenses by identifying online exploits that have the potential to hit their organizations and deploy security resources accordingly. How…
Putting Labs Under the Microscope
The broad adoption of multiple cloud providers has given rise to a “hybrid multi-cloud infrastructure for many organizations, which has increased security, compliance, and network management complexity. For instance, multi-cloud…