-
Protective DNS: Why Telcos Are Turning to DNS as the Platform for Consumer Security
For years, internet service providers have offered a range of consumer security services. These have typically focused on the endpoint and the home: secure residential gateways, parental controls and bundled antivirus or identity protection services. What they have not historically done is treat the network itself as the primary enforcement point for security. That is […]
The post Protective DNS: Why Telcos Are Turning to DNS as the Platform for Consumer Security appeared first on Infoblox Blog.
-
Automating Infoblox DDI with Red Hat Ansible: Bringing Configuration as Code to Critical Network Services
Why is automation of DNS, DHCP and IP address management (DDI) becoming so important for modern network environments? What are vendors like Red Hat and Infoblox doing to answer the call? And how are emerging concepts like “configuration as code” (CaC) reshaping the way teams think about critical network services? Let’s take a closer look. […]
The post Automating Infoblox DDI with Red Hat Ansible: Bringing Configuration as Code to Critical Network Services appeared first on Infoblox Blog.
-
Scams, Slaves and (Malware-as-a) Service: Tracking a Trojan to Cambodia’s Scam Centers
Authors: Infoblox Threat Intel and Chong Lua Dao Incidents of malware-enabled fraud and remote access scams have been on the rise against the backdrop of proliferating industrial-scale scam operations in Southeast Asia, with many countries in the region issuing official warnings over the past three years. But connecting specific malware to the notorious compounds has […]
The post Scams, Slaves and (Malware-as-a) Service: Tracking a Trojan to Cambodia’s Scam Centers appeared first on Infoblox Blog.
-
Hiding in Plain Sight: Abusing Composite Domain Names
Abstract Many DNS-based services utilize composite queries, which are queries formed by embedding a referenced domain as a subdomain. For example, example-com.translate.goog refers to example.com as the source domain. The use of composite queries allows services to route users effectively on the Internet; however, these services can also present a security challenge by enabling actors […]
The post Hiding in Plain Sight: Abusing Composite Domain Names appeared first on Infoblox Blog.
-
What You Cannot See is Hurting You Most
I was on a call last week with a vice president of IT operations who confidently told me their infrastructure visibility was “probably 85 percent, maybe 90 percent.” When I asked how they measured that, there was a pause. “Well, we run network scans weekly, we have got endpoint agents on most systems and our […]
The post What You Cannot See is Hurting You Most appeared first on Infoblox Blog.
-
NIST SP 800-81r3: A Long-Overdue Wake-Up Call for DNS Security
The release of the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-81 Revision 3 marks a pivotal moment for the cybersecurity and networking community. For years, SP 800-81 has been regarded as the gold standard for DNS deployment and operational best practices. But until now, it lagged behind the rapid evolution of […]
The post NIST SP 800-81r3: A Long-Overdue Wake-Up Call for DNS Security appeared first on Infoblox Blog.
-
Patterns, Pirates, and Provider Action: What We Learned Working with Keitaro
Authors: Infoblox Threat Intel and Confiant Executive Summary This post is part 3 in our multi‑part series examining abuse of Keitaro Tracker. In part 1 and part 2, we documented several threat types and actors that leverage Keitaro for a range of malicious activities. Part 2 also provided additional visibility into the prevalence of Keitaro […]
The post Patterns, Pirates, and Provider Action: What We Learned Working with Keitaro appeared first on Infoblox Blog.
-
NIST SP 800-81r3: What’s New?
Now that the National Institute of Standards and Technology (NIST) has published a new version of the Secure DNS Deployment Guide, Special Publication (SP) 800-81 (SP 800-81r3), you may have several questions in mind, such as “How is this version different than version 2?”, “What do those changes mean for me?”, “What actions do I […]
The post NIST SP 800-81r3: What’s New? appeared first on Infoblox Blog.
-
No Reach, No Risk: The Keitaro Abuse in Modern Cybercrime Distribution
Authors: Infoblox Threat Intel and Confiant Executive Summary Recently we published the first part of a four-month-long study conducted with Confiant on the abuse of Keitaro, an advertising performance tracker frequently abused by threat actors. We ran out of pages before we ran out of examples. The first blog focused on the use of AI, […]
The post No Reach, No Risk: The Keitaro Abuse in Modern Cybercrime Distribution appeared first on Infoblox Blog.
-
Unified Asset Visibility: A Strategic Imperative for CIOs and CISOs
On Monday morning, the CIO sees one picture of the environment in the cloud console, another in the configuration management database (CMDB) dashboard and a third in a capacity-planning spreadsheet. An hour later, the CISO joins a security review with yet another set of “authoritative” numbers coming from endpoint detection and response (EDR) systems, security […]
The post Unified Asset Visibility: A Strategic Imperative for CIOs and CISOs appeared first on Infoblox Blog.
-
Infoblox Partners with Leading SASE Vendors to Modernize DNS and DHCP for Distributed Enterprises
Ecosystem partnerships promise to bring cloud-based DDI to branch networks and introduce an Early Access Program for select customers. User experience determines the success of secure access service edge (SASE) programs, yet DNS and DHCP often go unnoticed until failures occur. These issues can appear as application outages, software-as-a-service (SaaS) slowdowns or site-specific problems that […]
The post Infoblox Partners with Leading SASE Vendors to Modernize DNS and DHCP for Distributed Enterprises appeared first on Infoblox Blog.
-
NIST DNS Security Best Practices: Top 5 Takeaways
For years, DNS flew under the radar—quietly doing its job while rarely getting the security focus it warranted. But that’s changing. In March 2026 the National Institute of Standards and Technology (NIST) published Special Publication (SP) 800-81 DNS Security Best Practices1 that brings DNS security guidance in line with today’s threat landscape and operational realities. […]
The post NIST DNS Security Best Practices: Top 5 Takeaways appeared first on Infoblox Blog.