-
4 Trends Shaping the Future of Network Operations
Hybrid and multi-cloud environments, distributed workforces and escalating cyberthreats are reshaping how organizations manage their networks. At the center of it all are the foundational services that keep everything connected: DNS, DHCP and IP address management (DDI). During our recent Winter Product Lookback Session, we highlighted several new innovations across Infoblox Universal DDI™, Infoblox Threat […]
The post 4 Trends Shaping the Future of Network Operations appeared first on Infoblox Blog.
-
Preemptive Threat Disruption at Scale: How Infoblox and Axur Turn External Risk into Protection
Security teams today don’t suffer from a lack of alerts. They suffer from a lack of effective intervention. Phishing, exec impersonation, fraud and credential abuse increasingly originate outside the enterprise, across domains, websites, social platforms, ads, mobile apps and underground forums. These environments sit beyond the reach of traditional security controls, and attackers can stand […]
The post Preemptive Threat Disruption at Scale: How Infoblox and Axur Turn External Risk into Protection appeared first on Infoblox Blog.
-
Why the Axur Acquisition Marks a Turning Point for Preemptive Security
For years, Infoblox has focused on being the most effective preemptive security solution on the market. We believe that being effective also means being simple to use and simple to deploy at scale. This philosophy continues to guide our industry-leading innovation and strategy today. We built our reputation as a leader in security by doing […]
The post Why the Axur Acquisition Marks a Turning Point for Preemptive Security appeared first on Infoblox Blog.
-
Don’t Wait To Be Attacked: Stop Phishing, C2 and Data Exfiltration with Infoblox Threat Intelligence in AWS Network Firewall
Security teams running AWS Network Firewalls are under constant pressure. Attacks keep getting more sophisticated, faster and automated, while teams and budgets do not. According to IBM’s 2024 Cost of a Data Breach Report, the average global cost of a data breach reached USD 4.88 million, a 10 percent increase over the prior year, and […]
The post Don’t Wait To Be Attacked: Stop Phishing, C2 and Data Exfiltration with Infoblox Threat Intelligence in AWS Network Firewall appeared first on Infoblox Blog.
-
Hold the Phone! International Revenue Share Fraud Driven by Fake CAPTCHAs
Authors: David Brunsdon, Darby Wise Executive Summary CAPTCHAs, the mundane tasks where we demonstrate our ability to select bicycles or distinguish chihuahuas from blueberry muffins, are increasingly being weaponized to trick users into performing actions with unexpected consequences. Fake CAPTCHAs are commonly associated with ClickFix attacks but have also been leveraged in other kinds of […]
The post Hold the Phone! International Revenue Share Fraud Driven by Fake CAPTCHAs appeared first on Infoblox Blog.
-
AI, Project Glasswing and DNS: Beyond Vulnerabilities
Project Glasswing is a genuine step change in cybersecurity. Anthropic’s Claude Mythos Preview model has reportedly uncovered thousands of previously unknown vulnerabilities across major operating systems, browsers and critical software, including a 27‑year‑old OpenBSD bug, a 16‑year‑old FFmpeg flaw and chained exploits in the Linux kernel that lead to full system compromise. It is powerful […]
The post AI, Project Glasswing and DNS: Beyond Vulnerabilities appeared first on Infoblox Blog.
-
Three Infoblox Integrations with Google Cloud That Give Enterprise Teams More Control Over Their Networks
Your network does not care that your team is busy. IP conflicts surface at the worst moments. DNS threats do not check your calendar. And when your address space spans on-premises infrastructure, branch offices, and the cloud at once, the gaps between your tools stop being an inconvenience. They become a liability. That is the […]
The post Three Infoblox Integrations with Google Cloud That Give Enterprise Teams More Control Over Their Networks appeared first on Infoblox Blog.
-
Protective DNS: Why Telcos Are Turning to DNS as the Platform for Consumer Security
For years, internet service providers have offered a range of consumer security services. These have typically focused on the endpoint and the home: secure residential gateways, parental controls and bundled antivirus or identity protection services. What they have not historically done is treat the network itself as the primary enforcement point for security. That is […]
The post Protective DNS: Why Telcos Are Turning to DNS as the Platform for Consumer Security appeared first on Infoblox Blog.
-
Automating Infoblox DDI with Red Hat Ansible: Bringing Configuration as Code to Critical Network Services
Why is automation of DNS, DHCP and IP address management (DDI) becoming so important for modern network environments? What are vendors like Red Hat and Infoblox doing to answer the call? And how are emerging concepts like “configuration as code” (CaC) reshaping the way teams think about critical network services? Let’s take a closer look. […]
The post Automating Infoblox DDI with Red Hat Ansible: Bringing Configuration as Code to Critical Network Services appeared first on Infoblox Blog.
-
Scams, Slaves and (Malware-as-a) Service: Tracking a Trojan to Cambodia’s Scam Centers
Authors: Infoblox Threat Intel and Chong Lua Dao Incidents of malware-enabled fraud and remote access scams have been on the rise against the backdrop of proliferating industrial-scale scam operations in Southeast Asia, with many countries in the region issuing official warnings over the past three years. But connecting specific malware to the notorious compounds has […]
The post Scams, Slaves and (Malware-as-a) Service: Tracking a Trojan to Cambodia’s Scam Centers appeared first on Infoblox Blog.
-
Hiding in Plain Sight: Abusing Composite Domain Names
Abstract Many DNS-based services utilize composite queries, which are queries formed by embedding a referenced domain as a subdomain. For example, example-com.translate.goog refers to example.com as the source domain. The use of composite queries allows services to route users effectively on the Internet; however, these services can also present a security challenge by enabling actors […]
The post Hiding in Plain Sight: Abusing Composite Domain Names appeared first on Infoblox Blog.
-
What You Cannot See is Hurting You Most
I was on a call last week with a vice president of IT operations who confidently told me their infrastructure visibility was “probably 85 percent, maybe 90 percent.” When I asked how they measured that, there was a pause. “Well, we run network scans weekly, we have got endpoint agents on most systems and our […]
The post What You Cannot See is Hurting You Most appeared first on Infoblox Blog.