Protective DNS Challenges Preemptively blocking connections to threat-related domains is a highly attractive opportunity for security teams of all sizes—one also promoted by standardization bodies like the National Institute of Standards and Technology (NIST), with the latest version of NIST Special Publication (SP) 800-81 Revision 31 serving as a key proof point. The technology enabling […] The post Operationalize Protective DNS Step-by-Step appeared first on Infoblox Blog.| Infoblox Blog
In today’s interconnected enterprise environments, the stability and security of network services and infrastructure directly impact business continuity and resilience. Among the most critical yet often overlooked components of the network are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) services. These services form the foundation upon which virtually all digital operations depend. […] The post Rethinking Critical Infrastructure: The Strategic Case for Decoupli...| Infoblox Blog
“Yes, you are blocking … but what device? Firewall? Laptop? Server? We are spending too much time on research instead of immediately actionable data.” — Director of SecOps, Insurance (fictionalized quote based on real feedback) Security teams are not short on alerts, but what they truly lack is clarity. The real challenge is not just […] The post Unlocking Instant Visibility on Impacted Assets with Asset Workspaces: SOC Transformation Starts Here appeared first on Infoblox Blog.| Infoblox Blog
This is the third in a three-part, in-depth report covering nearly a year of research into VexTrio. To learn more about the people and entities involved, see the first part here. To learn about VexTrio’s activities, see here. VexTrio domains and references from this research can be found in our GitHub repository. In the first […] The post Inside the Robot: Deconstructing VexTrio’s Affiliate Advertising Platform appeared first on Infoblox Blog.| Infoblox Blog
This is the second in a three-part, in-depth report covering nearly a year of research into VexTrio. To learn more about the people and entities involved, see the first part here. To learn about VexTrio’s infrastructure and technology stack, see here. VexTrio domains and references from this research can be found in our GitHub repository. […] The post VexTrio Unmasked: A Legacy of Spam and Homegrown Scams appeared first on Infoblox Blog.| Infoblox Blog
In today’s cybersecurity landscape, security operations teams face a perfect storm of challenges—escalating threat volumes, fragmented tools, complex UIs and overwhelming amounts of data. As a result, identifying and responding to threats quickly and effectively has become increasingly difficult, especially for resource-constrained teams in all types of organizations, big and small. Enter Infoblox Security Workspace, […] The post Operationalizing Preemptive Security: Easily Understand y...| Infoblox Blog
Welcome to Infoblox Blogs. Here, we share our thoughts on market trends and technology best practices on all aspects of core networking and security.| Infoblox Blog
For a long time, the cybersecurity world couldn’t quite agree on what DNS security actually meant. Was it just Domain Name System Security Extensions (DNSSEC)? Was it about stopping distributed denial-of-service (DDoS) attacks? Or was it using DNS as a cyber security control to block malware, commonly known as Protective DNS. The result was confusion, […] The post Redefining DNS Security: New Guidance Signals a Strategic Shift in Cybersecurity Control appeared first on Infoblox Blog.| Infoblox Blog
“Everyone knows that eliminating spam is impossible to achieve, until an ignorant person who doesn’t know this comes along and starts sending some (Italian) spammer to jail. <beg>” —Lex Tutor, 2011 This quote is powerful when you realize that it is referring to progenitors of the notorious VexTrio traffic distribution system (TDS). “Lex Tutor” was […] The post VexTrio’s Origin Story: From Spam to Scam to Adtech appeared first on Infoblox Blog.| Infoblox Blog
Author: Albert Chew and Rishabh Parmar Security operations (SecOps) teams are under mounting pressure to reduce incident response times, eliminate alert fatigue and improve visibility across increasingly complex environments. The integration of Infoblox, a leader in Protective DNS and DNS-based threat intelligence, with Google Security Operations empowers these teams with actionable intelligence, automated workflows […] The post Enhancing Threat Detection Using Infoblox Integration with ...| Infoblox Blog
When you’re running a network that absolutely, positively cannot go down, it’s natural to be skeptical of change. That’s especially true for the tools you use to manage critical DNS, DHCP and IP address management (DDI) services that keep your networks and business online. Maybe you’re part of a government agency with stringent compliance requirements. […] The post NIOS 9.0.7: Enterprise-Grade DDI, Now for Everyone appeared first on Infoblox Blog.| Infoblox Blog
Cybercrime is accelerating at an alarming pace, with global damages projected to soar to $23 trillion by 2027. Ransomware, supply chain attacks and AI-generated threats are breaking through traditional defenses—exposing a dangerous gap in how most organizations defend their infrastructure. What’s changed? Attackers are evolving faster than defenses. Armed with AI, they’re launching stealthier and more […] The post Infoblox Unveils a Radically Advanced Threat Defense to Preemptively ...| Infoblox Blog
This year’s National Intern Day reminds us of the importance of early career experience and mentorship. Over the past few months, Infoblox interns were tasked with real projects, invited into meaningful conversations and encouraged to ask questions—gaining insights from every level of the organization. Interns were welcomed into teams eager to support their growth and […] The post Celebrating National Intern Day: Inside the Infoblox 2025 Internship Program appeared first on Infoblox Blog.| Infoblox Blog
In its recent Advisory AA25‑203A, the Cybersecurity and Infrastructure Security Agency (CISA) reaffirms a powerful truth: Protective DNS (Domain Name System) remains one of the most effective defenses against ransomware.| Infoblox Blog
Often referred to as the “phonebook of the internet,” DNS translates domain names into IP addresses, allowing us to navigate the web. Its fundamental role in internet communication means DNS traffic routinely passes through corporate firewalls with minimal inspection.| Infoblox Blog
NTT DATA becomes the first Diamond Reseller in Infoblox’s Skilled to Secure Partner Program, showcasing global expertise and commitment to secure networking across sales, technical and professional services.| Infoblox Blog
The Verizon 2025 DBIR provides multiple insights on how adversaries have increased the scale of their operations and succeeded in finding new targets. According to Dr. Renée Burton, head of Infoblox Threat Intel, many of the Verizon findings highlight the under-recognized threat of traffic distribution systems (TDS) and malicious adtech.| Infoblox Blog
A cabal of Russian-nexus adtech companies are the cybercriminal choice to drive users to scams and malware from millions of compromised sites.| Infoblox Blog
The adverse impact of visiting compromised domains that integrate malicious adtech.| Infoblox Blog
Russian threat actors combine domain name vulnerabilities with hidden router proxy techniques to scale their attacks while remaining shielded from detection.| Infoblox Blog
Discover how Infoblox Threat Intel uncovered widespread usage of malicious spam and domain spoofing from Chinese actors. Learn about the tactics and gain insights into how threat actors bypass security safeguards.| Infoblox Blog
The VexTrio DDGA is being used by malicious actors who take advantage of cheap, private domain registrations to create complex attack infrastructure that remain undetected for a long time. Learn about it in this comprehensive report.| Infoblox Blog
Learn about the insidious DNS attack vector that threat actors are using to hijack domains from major brands, government institutions, and other organizations, large and small. Find out how to determine whether your domain name is at risk.| Infoblox Blog
Infoblox Threat Intel exposes registered DGAs (RDGAs), the novel DGAs used by threat actors like Revolver Rabbit to deliver XLoader, Hancitor, and other malware| Infoblox Blog