Security News
![Your Linux Machine Can Be Hacked Remotely With Just A Malicious DNS Response (The Hackers News)](/static/build/img/news/alt/cyberattack-stats-small.jpg)
A critical vulnerability has been discovered in Systemd, the popular init system and service manager for Linux operating systems, that could allow remote attackers to potentially trigger a buffer...
![Criminalization of DNS for phishing continues to advance (Help Net Security)](/static/build/img/news/alt/phishing-stats-2-small.jpg)
Cybercriminals have been shifting their tactics markedly, by registering more and more domain names, rather using web servers and domains they have hacked into. These “malicious domain...
![Akamai Launches New DNS Security Product (Security Week)](/static/build/img/news/alt/breach-statistics-small.jpg)
Content delivery network and cloud services provider Akamai announced on Tuesday the launch of a new product designed to protect enterprises against malware, phishing and data exfiltration...
![Mirai DNS Water Torture finance sector attack dominated Q1: Akamai (ZDNet)](/static/build/img/news/alt/DDoS-small.jpg)
![Taiwan government to block Google's public DNS in favor of HiNet's (The Register)](/static/build/img/news/alt/mac-stats-small.jpg)
![?Melbourne IT confirms DDoS attack behind DNS outage (ZDNet)](/static/build/img/news/alt/cyber-threat-stats-small.jpg)
![Brazilians whacked: Crooks hijack bank's DNS to fleece victims (The Register)](/static/build/img/news/alt/cost-stats-small.jpg)
![DNS records can reveal every web page you visit, says German boffin (The Register)](/static/build/img/news/alt/web-stats-small.jpg)
![Securing DNS Against Emerging Threats: A Hybrid Approach (SANS Reading Room)](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
![DNSMessenger backdoor/RAT uses DNS queries to communicate with C&C server (Help Net Security)](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
How to make sure that your malware will be able to communicate with its C&C servers even if the infected machine sits behind a company firewall and traffic to and from the corporate network is...