Unified Threat Management

Data Exfiltration and DNS: Closing Back-Door Access to your Sensitive Data

Provided by Infoblox

Category Unified Threat Management

Type White Paper

Length 9

Publish Date December 01 2016

Date posted December 19 2016

Overview

If not properly monitored, DNS can be abused in all sorts of unconventional ways that make it the perfect back door for hackers seeking to steal sensitive data. This paper lays out the tactics hackers use to exploit DNS for purposes of DNS tunneling and data exfiltration.

Blogs

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Do you use any voice/digital assistants to help you work?