Videos Hacking Demo #5 Zero-Day Attack Fifth educational video in our series on malicious hacking, where you will discover how to protect users and infrastructures against DNS-based malware. See Also
Videos Hacking Demo #4 Keylogger Fourth educational video in our series on malicious hacking, where you will discover how to protect users and infrastructures against DNS-based malware. See Also
Videos Hacking Demo #3 Data Exfiltration As the DNS protocol is authorized to go from the inside of the network to the Internet, some have found a way to use it to silently exfiltrate valuable data. Malware installed on a victim’s...
Videos Hacking Demo #2 Command & Control This video portrays how malware uses command and control through the DNS protocol in order to contact the main server, to move onto their next act. In the previous video on phishing, one main infection...
Videos Hacking Demo #1 Mail Infection This demo video presents how mail infection can help malware enter the enterprise network. Once the user has opened the infected email attachment (e.g. an invoice, proposal, funny picture, resume), the malware installs itself and...
Videos Improve Disaster Recovery Planning with DNS GSLB Follow Meg & Tom in their IT adventures in this episode focusing on how a DRP can be a simple operation to prepare and execute with an Edge DNS GSLB solution. While application data controllers...