all InfoSec news
What Is Adversary Infrastructure?
Security Boulevard securityboulevard.com
Chasing Command-and-Control
When companies and organizations started initially trying to determine what was and wasn’t command-and-control (2) on the Internet so they could implement Protective DNS and related solutions, the first and easiest solution was the tried-and-true “allow and deny” lists. It’s a reasonably simple but effective approach – the only question is how best to populate the deny list to ensure that it stays reasonably up-to-date.
Some organizations would detonate malware, and the race would begin to …
adversary blog command companies control dns infrastructure internet lists organizations question simple solution solutions what is