{"id":9916,"date":"2024-04-29T10:00:43","date_gmt":"2024-04-29T17:00:43","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=9916"},"modified":"2024-05-29T08:16:18","modified_gmt":"2024-05-29T15:16:18","slug":"catching-threat-actors-in-dns-using-infoblox-threat-intel","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/","title":{"rendered":"Catching Threat Actors in DNS Using Infoblox Threat Intel"},"content":{"rendered":"<p>In today\u2019s interconnected world, cyber threats pose a significant risk to organizations of all sizes. From sophisticated spear phishing attacks to MFA attacks that use lookalike domains to Traffic Distribution Systems (TDS), the threat landscape continues to evolve at a faster pace than existing defenses, causing breaches and data theft. In many of the attacks, threat actors age their domains for a very long time, sometimes even 120 days after the domains are registered. In other cases, threat actors are very quick and use registered domains within a few hours, targeting specific organizations.<\/p>\n<p>Current security tools use a malware-centric approach, which means there must be some evidence of compromise before they start blocking malicious domains, and it could already be too late. There is a need to take a different approach to security, one that can proactively protect enterprises from criminal actors as they build their infrastructure to launch attacks.<\/p>\n<p>Threat actors create thousands of new domains every day and rely on DNS to run malicious campaigns. All it takes is one DNS query to compromise a network. But the good news is 92% of attacks can be blocked using DNS, if done correctly.<\/p>\n<h3>Infoblox Threat Intel: Hunts Threats in DNS to Disrupt Cybercrime at its Core<\/h3>\n<p>Infoblox takes a unique approach to threat detection and response. It uses AI and patented algorithms to identify dangerous domains before actors use them, often months ahead of other security tools.<\/p>\n<p>Here\u2019s how Infoblox Threat Intel works:<\/p>\n<ol>\n<li><strong>DNS Expertise:<\/strong> Infoblox specializes in DNS. Our team of experts have a deep understanding of and unique visibility into DNS, allowing us to identify attacker infrastructure as it gets created to preempt and block emerging threats.<\/li>\n<li><strong>Data Science and Correlation:<\/strong> We combine DNS expertise with cutting-edge data science techniques. Tens of algorithms identify suspicious domains among the 200,000+ newly registered every day. Machine learning identifies groups of domains that are registered or used together for malicious purposes. These detections are correlated and connected to threat actor infrastructure to allow a holistic view of the threat landscape.<\/li>\n<li><strong>Threat Actor Tracking:<\/strong> Infoblox connects the dots between threat actors and their infrastructure. A patent pending architecture allows Infoblox Threat Intel to identify emerging threats and watch threat actors as they set up their domains for attack. Actor algorithms monitor infrastructure for changes and harvest new threats. <\/li>\n<\/ol>\n<p>Infoblox Threat Intel has researchers in 5 countries across 8 time zones and is the first and only team in the world with the combination of deep expertise in DNS, data science, ML\/AI, intelligence analysis, S\/W reverse engineering and malicious spam detection. It is headed by Dr. Ren\u00e9e Burton, a 22-year veteran of the NSA.<\/p>\n<h3>By the Numbers<\/h3>\n<p>Infoblox Threat Intel:<\/p>\n<ul>\n<li>Detects 60% of threats before the first DNS query and 82% within 24 hours of the first query<\/li>\n<li>Blocks attacks on an average of 63 days earlier<\/li>\n<li>Has 0.0002% false positive rate<\/li>\n<li>Adds close to 4M new malicious and suspicious domains monthly<\/li>\n<li>Analyzes 70 billion DNS events daily<\/li>\n<\/ul>\n<h3>Powering BloxOne Threat Defense for Proactive Protection<\/h3>\n<p>The DNS centric threat intelligence is used in Infoblox\u2019s DNS Detection and Response solution, which includes the flagship product BloxOne Threat Defense, to proactively protect customers against emerging threats, while ensuring critical domains are not blocked.<\/p>\n<p><strong>Threat Actor Reports:<\/strong> Infoblox Threat Intel also frequently publishes reports on threat actors detected in customer networks and domains related to those threat actors, and these publications are now easily accessible from within the BloxOne Threat Defense user interface.  <\/p>\n<p><strong>Zero Day DNS<sup>TM<\/sup>:<\/strong> Complementing the threat intelligence is another feature of BloxOne Threat Defense that addresses threats from domains that are registered and used immediately for attacks. This capability, called Zero Day DNS\u2122, inspects customer network DNS traffic in near real time to detect and block threats from domains that are registered by threat actors just minutes to hours before being used in an attack. This protects customers against targeted attacks like spear phishing that leverage lookalike domains, providing the earliest defense against these attacks.<\/p>\n<p><strong>Sharing with the Ecosystem:<\/strong> BloxOne Threat Defense can also automatically share Infoblox Threat Intel with other existing security and observability ecosystem tools such as SIEMs, NGFWs and proxies to enhance protection against DNS threats across all control points and maximize security ROI.<\/p>\n<p>In conclusion, Infoblox Threat Intel is more than just threat detection; it\u2019s a proactive defense strategy. By focusing on DNS, we disrupt threat actors\u2019 operations and enhance your existing security ecosystem. Cybersecurity is a collective effort. Stay informed, stay vigilant, and partner with Infoblox to secure your digital future.<\/p>\n<p>Click <a href=\"https:\/\/www.infoblox.com\/threat-intel\/\" rel=\"noopener\" target=\"_blank\">here<\/a> for more information on Infoblox Threat Intel.<\/p>\n<p>Click <a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\" rel=\"noopener\" target=\"_blank\">here<\/a> for more information on BloxOne Threat Defense.<\/p>\n<p><script>\njQuery('.single h1').html('Catching Threat Actors in DNS Using <span class=\"gradient\">Infoblox Threat Intel<\/span>');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s interconnected world, cyber threats pose a significant risk to organizations of all sizes. From sophisticated spear phishing attacks to MFA attacks that use lookalike domains to Traffic Distribution Systems (TDS), the threat landscape continues to evolve at a faster pace than existing defenses, causing breaches and data theft. In many of the attacks, [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":9920,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[40,930,360,32,307],"class_list":{"0":"post-9916","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-threat-intelligence","9":"tag-cybercrime","10":"tag-dns-security","11":"tag-malware","12":"tag-phishing","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Catch Threat Actors in DNS Using Infoblox Threat Intel<\/title>\n<meta name=\"description\" content=\"Learn how Infoblox proactively protects enterprises from criminal actors, hunting threats in DNS to disrupt cybercrime at its core.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Catch Threat Actors in DNS Using Infoblox Threat Intel\" \/>\n<meta property=\"og:description\" content=\"Learn how Infoblox proactively protects enterprises from criminal actors, hunting threats in DNS to disrupt cybercrime at its core.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-29T17:00:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-29T15:16:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/catching-threat-actors-in-dns-using-infoblox-threat-intel-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Catch Threat Actors in DNS Using Infoblox Threat Intel\" \/>\n<meta name=\"twitter:description\" content=\"Learn how Infoblox proactively protects enterprises from criminal actors, hunting threats in DNS to disrupt cybercrime at its core.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/catching-threat-actors-in-dns-using-infoblox-threat-intel-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"Catching Threat Actors in DNS Using Infoblox Threat Intel\",\"datePublished\":\"2024-04-29T17:00:43+00:00\",\"dateModified\":\"2024-05-29T15:16:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel\\\/\"},\"wordCount\":777,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel-thumbnail.jpg\",\"keywords\":[\"Threat Intelligence\",\"Cybercrime\",\"DNS Security\",\"Malware\",\"Phishing\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel\\\/\",\"name\":\"Catch Threat Actors in DNS Using Infoblox Threat Intel\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel-thumbnail.jpg\",\"datePublished\":\"2024-04-29T17:00:43+00:00\",\"dateModified\":\"2024-05-29T15:16:18+00:00\",\"description\":\"Learn how Infoblox proactively protects enterprises from criminal actors, hunting threats in DNS to disrupt cybercrime at its core.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/catching-threat-actors-in-dns-using-infoblox-threat-intel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Catching Threat Actors in DNS Using Infoblox Threat Intel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Catch Threat Actors in DNS Using Infoblox Threat Intel","description":"Learn how Infoblox proactively protects enterprises from criminal actors, hunting threats in DNS to disrupt cybercrime at its core.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/","og_locale":"en_US","og_type":"article","og_title":"Catch Threat Actors in DNS Using Infoblox Threat Intel","og_description":"Learn how Infoblox proactively protects enterprises from criminal actors, hunting threats in DNS to disrupt cybercrime at its core.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/","og_site_name":"Infoblox Blog","article_published_time":"2024-04-29T17:00:43+00:00","article_modified_time":"2024-05-29T15:16:18+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/catching-threat-actors-in-dns-using-infoblox-threat-intel-thumbnail.jpg","type":"image\/jpeg"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_title":"Catch Threat Actors in DNS Using Infoblox Threat Intel","twitter_description":"Learn how Infoblox proactively protects enterprises from criminal actors, hunting threats in DNS to disrupt cybercrime at its core.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/catching-threat-actors-in-dns-using-infoblox-threat-intel-thumbnail.jpg","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"Catching Threat Actors in DNS Using Infoblox Threat Intel","datePublished":"2024-04-29T17:00:43+00:00","dateModified":"2024-05-29T15:16:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/"},"wordCount":777,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/catching-threat-actors-in-dns-using-infoblox-threat-intel-thumbnail.jpg","keywords":["Threat Intelligence","Cybercrime","DNS Security","Malware","Phishing"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/","url":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/","name":"Catch Threat Actors in DNS Using Infoblox Threat Intel","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/catching-threat-actors-in-dns-using-infoblox-threat-intel-thumbnail.jpg","datePublished":"2024-04-29T17:00:43+00:00","dateModified":"2024-05-29T15:16:18+00:00","description":"Learn how Infoblox proactively protects enterprises from criminal actors, hunting threats in DNS to disrupt cybercrime at its core.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/catching-threat-actors-in-dns-using-infoblox-threat-intel-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/catching-threat-actors-in-dns-using-infoblox-threat-intel-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/catching-threat-actors-in-dns-using-infoblox-threat-intel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Catching Threat Actors in DNS Using Infoblox Threat Intel"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=9916"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9916\/revisions"}],"predecessor-version":[{"id":9981,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9916\/revisions\/9981"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/9920"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=9916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=9916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=9916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}