Cloud DNS

This domain is registered for one of our customers.

If this is your domain name, please visit this page to see how to register it as DNS zone into your account.

Note: If you already have registered the DNS zone for your domain name, please wait for DNS propagation. Your web site will be displayed soon. It may take few minutes.

* Do you know what DNS Tunneling is?

Suggested article: DNS Tunneling attack – What is it, and how to protect ourselves?

DNS tunneling attack exploits the DNS (Domain Name System). The cybercriminals manage to execute tunneling malware or data through a client-server model.

The attack is triggered when a regular user downloads malware or the attacker uses for its purpose a vulnerability of the compromised device to transfer a malicious payload. In the majority of cases, the attackers want to persist in connection with the compromised device. That way, they have the ability to run different commands on the target device or exfiltrate data. For that reason, usually, they use a command-and-control (C2) connection.

What can you do?

  • Be aware of any doubtful domain names, and it is useful to monitor the DNS traffic. That way, you can lower the possibility for a DNS tunneling attack to occur.
  • Establish a DNS firewall. It is going to serve to identify and stop any hacker intrusion.

If you are curious to learn more about this cyber threat, take a look at additional information about how to detect a DNS Tunneling attack!