If you’re worried about the vulnerability of your Domain Name System (DNS) infrastructure, it’s warranted. According to the Infoblox DNS Threat Index Q3 2015 Report, hackers created a whopping 75 percent more exploit kits than the year previously. Angler was one of those.
Recently a major British newspaper with hundreds of millions of monthly visits to its website was hit with Angler, resulting in malicious ads being displayed to its readers for a few days, and potentially exposing many visitors to infection if they clicked on the ads. Because exploit kits are best at taking advantage of zero-day vulnerabilities, they can be a leading vehicle for dropping malware that attempts data exfiltration. Furthermore, advanced persistent threats (APTs) and malware rely on DNS, a ubiquitous yet often overlooked protocol, to communicate with their command and control or botnet server.
That’s why networking and security teams need to go beyond traditional perimeter defenses to address what happens once malware gets inside the network. Taking a DNS-centric approach to security can help address the variety and sophistication of threats aimed at taking down network infrastructure and stealing data.
Join us January 27th at 10 a.m. Pacific/1 p.m. Eastern for a new webinar, Why You Should Take DNS as a Threat Vector Seriously, to learn about:
- The latest Infoblox DNS Threat Index, and what it reveals about threats to your critical infrastructure and data
- The top DNS threats
- Best practices for improving security through DNS
Register here, so you can protect your network’s vulnerabilities.