May 14, 2024, 11:44 a.m. | Ionut Arghire

SecurityWeek RSS Feed www.securityweek.com

Threat actors are using DNS tunneling to track victims’ interaction with spam and to scan network infrastructures.


The post Attackers Use DNS Tunneling to Track Victim Activity, Scan Networks appeared first on SecurityWeek.

attackers dns dns tunneling malware malware & threats network networks scan spam threat threat actors track tunneling victim

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC