DNS tunneling techniques in cyberattacks

How DNS tunneling can be used for data exfiltration? And how can be detected? DNS Tunneling is a technique that encodes data of other programs or protocols in DNS queries, including data payloads that can be added to an attacked DNS server and used to control a remote server and applications. DNS tunneling was originally…

Some thoughts about Lateral Movement techniques

The ability to quickly and reliably detect lateral movement in the network is one of the most important skills in information security today: the lateral movement attack phase represents the biggest difference between a targeted and┬ástrategic attacks and a simplistic hit-and-run attack. What is lateral movement? Lateral movement refers to the various techniques attackers use…