What is a DNS Leak? How can I prevent it?
At SecurityTrails we analyze DNS servers, along with their records, domains and IP addresses, to bring you the ultimate cybersecurity treasure trove for identifying and preventing infosec issues on your company’s websites and apps. Some time ago, we published a great guide on how to prevent DNS server attacks, and today we’re moving one step forward: to explore how to prevent DNS leaks, which became a pretty popular topic with the end of the net neutrality months ago.
What is OSINT? How can I make use of it?
In the past months, we have reviewed a couple interesting OSINT utilities. In fact, a few weeks ago, we also published the Top 20 OSINT Tools as a great resource for everyone starting an information security investigation. But one thing is missing for all those who have just been introduced to the fascinating world of cybersecurity: the key concept of OSINT.
Firefox DNS over SSL and Cloudflare public resolvers: What you need to know
The net neutrality is dead. It is sad, but true. With this new regulation, ISPs are able to manage customer traffic as they like, and this has raised many questions and concerns over users privacy in the past months.
DNS records and types you didn’t know about
DNS records are an important part of internet. It is from DNS records that DNS servers know which domain is associated with what IP address. To simplify, we can turn to an analogy: your home address has coordinates that helps locate them in GPS. Since nobody can really remember that string of number precisely, you would tell them your street name and number. The same concept exists with domains and IP addresses, domains being street names and numbers, IP addresses being longitude points.
How to use reverse DNS records to identify mass scanners
Search engine crawlers, botnets, and mass scanners are constantly probing the entire IPv4 space of the internet. Determining which incoming traffic is “friendly” is an ongoing task for network administrators and information security professionals.