{"id":10733,"date":"2024-10-16T08:38:17","date_gmt":"2024-10-16T15:38:17","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=10733"},"modified":"2024-10-16T09:07:07","modified_gmt":"2024-10-16T16:07:07","slug":"cybersecurity-awareness-month-secure-our-world-with-dns","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/","title":{"rendered":"Cybersecurity Awareness Month: Secure Our World with DNS"},"content":{"rendered":"<p>October is Cybersecurity Awareness Month. This year\u2019s theme is \u201cSecure Our World\u201d, with an emphasis on the actions everyone can take to improve the security of what we do on the internet and the data we put out there. You will hear recommendations ranging from individual-focused reminders to not reusing passwords to tried and tested enterprise-focused best practices. Sometimes overlooked in all of this great information is the power, simplicity, and pervasiveness of the Domain Name System (DNS). Not only can it be a valuable tool for stopping attacks dead in their tracks, but it can also be used to prevent attacks from happening in the first place. Since DNS is used by individuals, multi-national organizations, and everyone in between, it can be used as a tool to improve the security for everyone. DNS is so important that governments around the world are exploring options to provide <a href=\"https:\/\/www.infoblox.com\/dns-security-resource-center\/dns-security-faq\/what-is-protective-dns-pdns\/\" rel=\"noopener\" target=\"_blank\">protective DNS<\/a> to their citizens.<\/p>\n<h3>What Is So Important About DNS Anyway?<\/h3>\n<p>Most people describe DNS as the phonebook of the internet (or even the Yellow Pages of the internet if they are old enough). DNS is much more than that though. Whenever a new domain name is registered, that information is stored in DNS. When that domain is set up to host a new website or send out emails, that information is configured in DNS. As that information changes over time, those changes are also reflected in DNS. All of this happens in the background, and most users never know it happens. Bad actors thrive on staying hidden in the shadows, but their actions leave footprints in DNS. As much as they try to hide, they must use DNS for their attacks to work. In fact, five of the seven steps in the <a href=\"https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html\" rel=\"noopener\" target=\"_blank\">Cyber Kill Chain<\/a> use DNS in one way or another. These DNS footprints are visible, if you know what to look for.<\/p>\n<p>Infoblox Threat Intel looks for these footprints in billions of DNS events every day. We find <a href=\"https:\/\/insights.infoblox.com\/resources-report\/infoblox-report-deep3r-look-at-lookal1ke-attacks\" rel=\"noopener\" target=\"_blank\">lookalike domains<\/a> that spoof your bank, phishing domains with randomly generated names, and active domains that appear to be dormant to hide in plain sight. We find domains registered one at a time and clusters of domains all registered at once, all through DNS. Notably, we have identified and tracked numerous <a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/from-click-to-chaos-bouncing-around-in-malicious-traffic-distribution-systems\/\" rel=\"noopener\" target=\"_blank\">Traffic Distribution Systems<\/a> (TDSs) that have operated largely undetected for years. Bad actors like <a href=\"https:\/\/www.infoblox.com\/threat-intel\/threat-actors\/vextrio\/\" rel=\"noopener\" target=\"_blank\">Vextrio Viper<\/a>, <a href=\"https:\/\/www.infoblox.com\/threat-intel\/threat-actors\/savvy-seahorse\/\" rel=\"noopener\" target=\"_blank\">Savvy Seahorse<\/a>, and <a href=\"https:\/\/www.infoblox.com\/threat-intel\/threat-actors\/vigorish-viper\/\" rel=\"noopener\" target=\"_blank\">Vigorish Viper<\/a> use networks of as many as a hundred thousand domains to serve victims with personalized attacks ranging from cryptoscams to malware. Using a complex system of redirects, user identification, and a little randomness, TDSs are designed to confuse victims and researchers alike. Conventional methods for investigating these attacks face considerable challenges, but using DNS allows us to see past all these tricks to understand what is really going on.  <\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/cybersecurity-awareness-month-secure-our-world-with-dns-figure-1.png\" alt=\"Figure 1: Simplified illustration of a company asset accidentally looking up an internal corporate domain that has become hosted externally and controlled by a threat actor\" \/><\/p>\n<p class=\"image-caption\">Figure 1 \u2013 Most tools attempt to identify and defend against active attacks. DNS provides the opportunity to identify and block attacks while bad actors are still making preparations, before the attack.<\/p>\n<h3>Defense-in-Depth With DNS<\/h3>\n<p>If you have spent any time reading about cybersecurity, you have probably heard of the many acronym-laden tools that exist in that space. Tools like NGFW, XDR, EDR, and SASE are used to secure organizations and their data. These tools play an important part in security, but all of them rely on detecting and stopping an attack after it has started. Furthermore, many of these tools primarily focus on malware, which must be identified and analyzed to develop an effective defense. Since the malware landscape is always changing, these tools will always be one step behind. While DNS complements these tools, it is unique in that it provides the opportunity to stop attacks before they ever begin (see Figure 1). <\/p>\n<p>At its most basic, DNS can be used to prevent the domain name of a malicious website resolving to an IP address. If a user\u2019s computer can\u2019t get the IP address, it can\u2019t send that message containing their credit card information to the bad guy and it definitely can\u2019t download that malware. Although this may be all that a user sees happening, or may even care about happening, DNS is far more important, and far more powerful than just blocking bad domains. It can be used proactively to find suspicious domains before they are active and before they are seen in a network during an attack. <\/p>\n<p>When a bad actor registers a new domain name, it is visible in DNS. If you know what to look for, you can find suspicious domain registrations. Maybe the contact information is the same as other domains you know to be bad or the domain name itself isn\u2019t normal. When a bad actor changes the IP address of a domain, we can look to see if the IP address has a history of being malicious. It might be that none of these events are suspicious by themselves, but in combination, there may be a pattern we&#8217;ve seen before in other malicious domains. In contrast to other tools and approaches, none of this requires analysis of malware or seeing the domain in an attack. It can be done while the bad actor is preparing the domain before they launch the attack. <\/p>\n<p>These DNS-powered investigations don\u2019t just find individual domains here and there, though. They can be used to find clusters of domains all at once. Once you begin to pull the thread of something suspicious, patterns and trends comprising thousands of domains can appear. The same tools and services that allow companies to operate on a large scale also allow bad actors to operate on a large scale. In fact, an entire industry of cybercrime supply chain providers has emerged so bad actors can outsource operations and focus on their attacks. Vextrio Viper and Vigorish Viper are perfect examples. Both actors offer affiliates use of their TDSs for a fee. Using DNS, we identified, tracked, and blocked both TDSs. This effectively blocked not only the Vextrio and Vigorish campaigns, but also all the campaigns of every one of their affiliates.<\/p>\n<h3>DNS Matters for Everyone<\/h3>\n<p>While bad actors are always trying new tactics, there are some that always work. Because they always work, they use them against everyone. People using their laptop to get on the web at the local coffee shop are victims of the same attacks and lures used against employees at muti-national corporations. Fortunately, DNS plays a role in these attacks, and it can be used to stop them. Whether it is a simple protective DNS service for your laptop or an enterprise-grade DNS solution, everyone can use DNS to secure their part of the world. <\/p>\n<p>To learn more about how Infoblox Threat Intel uses DNS to secure our world, go to <a href=\"https:\/\/www.infoblox.com\/threat-intel\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.infoblox.com\/threat-intel\/<\/a>. <\/p>\n<style>\n.savy-seahorse-table {\nfont-size:14px;\nword-break: keep-all;\n}\n.savy-seahorse-table td:last-child, .savy-seahorse-table th:last-child {\npadding-right:10px;\n}\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}<\/p>\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Cybersecurity Awareness Month<\/span>: Secure Our World with DNS');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>October is Cybersecurity Awareness Month. This year\u2019s theme is \u201cSecure Our World\u201d, with an emphasis on the actions everyone can take to improve the security of what we do on the internet and the data we put out there. You will hear recommendations ranging from individual-focused reminders to not reusing passwords to tried and tested [&hellip;]<\/p>\n","protected":false},"author":406,"featured_media":10736,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[893,30,1119,189,577,1036],"class_list":{"0":"post-10733","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-domain-name-system","9":"tag-dns","10":"tag-emergent","11":"tag-cybersecurity","12":"tag-cybersecurity-awareness-month","13":"tag-infoblox-threat-intel","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Use DNS to Secure Your World Before an Attack Happens | Infoblox<\/title>\n<meta name=\"description\" content=\"DNS is a powerful for everyone from individuals to multi-national organizations to improve security against a variety of threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Use DNS to Secure Your World Before an Attack Happens | Infoblox\" \/>\n<meta property=\"og:description\" content=\"DNS is a powerful for everyone from individuals to multi-national organizations to improve security against a variety of threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-16T15:38:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-16T16:07:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-awareness-month-secure-our-world-with-dns-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brent Eskridge\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Use DNS to Secure Your World Before an Attack Happens | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"DNS is a powerful for everyone from individuals to multi-national organizations to improve security against a variety of threats.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-awareness-month-secure-our-world-with-dns-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brent Eskridge\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cybersecurity-awareness-month-secure-our-world-with-dns\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cybersecurity-awareness-month-secure-our-world-with-dns\\\/\"},\"author\":{\"name\":\"Brent Eskridge\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/688c398d0778a7e0ee5345e8be5d655c\"},\"headline\":\"Cybersecurity Awareness Month: Secure Our World with DNS\",\"datePublished\":\"2024-10-16T15:38:17+00:00\",\"dateModified\":\"2024-10-16T16:07:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cybersecurity-awareness-month-secure-our-world-with-dns\\\/\"},\"wordCount\":1142,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cybersecurity-awareness-month-secure-our-world-with-dns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-awareness-month-secure-our-world-with-dns-thumbnail.jpg\",\"keywords\":[\"Domain Name System\",\"DNS\",\"emergent\",\"Cybersecurity\",\"Cybersecurity awareness month\",\"infoblox threat intel\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cybersecurity-awareness-month-secure-our-world-with-dns\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cybersecurity-awareness-month-secure-our-world-with-dns\\\/\",\"name\":\"Use DNS to Secure Your World Before an Attack Happens | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cybersecurity-awareness-month-secure-our-world-with-dns\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cybersecurity-awareness-month-secure-our-world-with-dns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-awareness-month-secure-our-world-with-dns-thumbnail.jpg\",\"datePublished\":\"2024-10-16T15:38:17+00:00\",\"dateModified\":\"2024-10-16T16:07:07+00:00\",\"description\":\"DNS is a powerful for everyone from individuals to multi-national organizations to improve security against a variety of threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cybersecurity-awareness-month-secure-our-world-with-dns\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cybersecurity-awareness-month-secure-our-world-with-dns\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cybersecurity-awareness-month-secure-our-world-with-dns\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-awareness-month-secure-our-world-with-dns-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-awareness-month-secure-our-world-with-dns-thumbnail.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cybersecurity-awareness-month-secure-our-world-with-dns\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Awareness Month: Secure Our World with DNS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/688c398d0778a7e0ee5345e8be5d655c\",\"name\":\"Brent Eskridge\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/brent-eskridge-headshot-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/brent-eskridge-headshot-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/brent-eskridge-headshot-96x96.jpg\",\"caption\":\"Brent Eskridge\"},\"description\":\"Brent Eskridge, PhD, is a Staff Threat Researcher with over 25 years of experience. He has held positions as a software engineer, university professor, and, most recently, a threat researcher. Brent is currently a member of Infoblox\u2019s Threat Intelligence Group, which provides customers with intelligence needed to block the newest threats. Brent focuses on development of new algorithms, researching new cyber threats, and communicating their research to others.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/brent-eskridge\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Use DNS to Secure Your World Before an Attack Happens | Infoblox","description":"DNS is a powerful for everyone from individuals to multi-national organizations to improve security against a variety of threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/","og_locale":"en_US","og_type":"article","og_title":"Use DNS to Secure Your World Before an Attack Happens | Infoblox","og_description":"DNS is a powerful for everyone from individuals to multi-national organizations to improve security against a variety of threats.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/","og_site_name":"Infoblox Blog","article_published_time":"2024-10-16T15:38:17+00:00","article_modified_time":"2024-10-16T16:07:07+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-awareness-month-secure-our-world-with-dns-thumbnail.jpg","type":"image\/jpeg"}],"author":"Brent Eskridge","twitter_card":"summary_large_image","twitter_title":"Use DNS to Secure Your World Before an Attack Happens | Infoblox","twitter_description":"DNS is a powerful for everyone from individuals to multi-national organizations to improve security against a variety of threats.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-awareness-month-secure-our-world-with-dns-thumbnail.jpg","twitter_misc":{"Written by":"Brent Eskridge","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/"},"author":{"name":"Brent Eskridge","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/688c398d0778a7e0ee5345e8be5d655c"},"headline":"Cybersecurity Awareness Month: Secure Our World with DNS","datePublished":"2024-10-16T15:38:17+00:00","dateModified":"2024-10-16T16:07:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/"},"wordCount":1142,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-awareness-month-secure-our-world-with-dns-thumbnail.jpg","keywords":["Domain Name System","DNS","emergent","Cybersecurity","Cybersecurity awareness month","infoblox threat intel"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/","name":"Use DNS to Secure Your World Before an Attack Happens | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-awareness-month-secure-our-world-with-dns-thumbnail.jpg","datePublished":"2024-10-16T15:38:17+00:00","dateModified":"2024-10-16T16:07:07+00:00","description":"DNS is a powerful for everyone from individuals to multi-national organizations to improve security against a variety of threats.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-awareness-month-secure-our-world-with-dns-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cybersecurity-awareness-month-secure-our-world-with-dns-thumbnail.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cybersecurity-awareness-month-secure-our-world-with-dns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Awareness Month: Secure Our World with DNS"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/688c398d0778a7e0ee5345e8be5d655c","name":"Brent Eskridge","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/brent-eskridge-headshot-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/brent-eskridge-headshot-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/brent-eskridge-headshot-96x96.jpg","caption":"Brent Eskridge"},"description":"Brent Eskridge, PhD, is a Staff Threat Researcher with over 25 years of experience. He has held positions as a software engineer, university professor, and, most recently, a threat researcher. Brent is currently a member of Infoblox\u2019s Threat Intelligence Group, which provides customers with intelligence needed to block the newest threats. Brent focuses on development of new algorithms, researching new cyber threats, and communicating their research to others.","url":"https:\/\/www.infoblox.com\/blog\/author\/brent-eskridge\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/406"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=10733"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10733\/revisions"}],"predecessor-version":[{"id":10739,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10733\/revisions\/10739"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/10736"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=10733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=10733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=10733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}