PLAY PODCASTS
DNS Under Attack: How Cybercriminals Exploit the Backbone of the Internet
Episode 171

DNS Under Attack: How Cybercriminals Exploit the Backbone of the Internet

TechDaily.ai

May 5, 202510m 50s

Audio is streamed directly from the publisher (media.transistor.fm) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

Ever typed a URL and landed exactly where you wanted? Thank DNS. But what happens when that system is hijacked?

In this eye-opening deep dive, we unpack how the Domain Name System (DNS)—the internet's invisible address book—can be weaponized by cybercriminals. From DNS cache poisoning to domain hijacking, rebinding attacks, and covert data exfiltration, we break down real-world exploitation techniques that fly under the radar.

🔍 What You’ll Learn:

  • How Domain Generation Algorithms (DGAs) support malware
  • The dangers of lame delegations and DNS rebinding
  • How attackers use DNS as a stealthy communication channel
  • What “DNS beacons” really mean for C2 traffic
  • Which stakeholders can actually stop DNS-based attacks—and how

💡 Whether you're an IT pro, incident responder, or just security-curious, this episode reveals the dark side of a system you use every day.

👉 Sponsored by StoneFly.com – Enterprise-grade data protection & cloud solutions.

Topics

technologyinformation securityDNS securitydomain name system attackDNS abuse techniquesDNS cache poisoningdomain hijackingDNS rebindingDGAs malwareDNS exfiltrationDNS communication channelDNS spoofingDNS cybersecurity podcastincident response DNSDNS stakeholdersdetect mitigate prevent DNSDNS C2 communicationDNS threat landscape