CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs

May 3, 2024 at 06:38PM CISO Corner offers articles for security leaders. This issue highlights Verizon DBIR findings, workplace exclusion in cybersecurity, DMARC adoption, Muddling Meerkat’s DNS activities, shadow APIs risk, and a cybersecurity checklist for M&A deals. Also, a new podcast “Dark Reading Confidential” will feature firsthand stories from cybersecurity practitioners. Follow on Spotify, … Read more

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

April 30, 2024 at 01:33PM A new threat actor called Muddling Meerkat, linked to the Chinese government, has been scanning DNS networks for years, manipulating DNS mail server records using fake responses. It can control the Great Firewall of China and may be preparing for cyberattacks. Admins are advised to eliminate open resolvers and use … Read more

Muddling Meerkat hackers manipulate DNS using China’s Great Firewall

April 29, 2024 at 04:27PM A new cluster of activity known as “Muddling Meerkat” is linked to a Chinese state-sponsored threat actor manipulating global DNS systems since October 2019. Notable for its manipulation of MX records through China’s Great Firewall, the activity exhibits advanced capabilities to provoke false responses and prompt fake DNS queries. The … Read more

‘Muddling Meerkat’ Poses Nation-State DNS Mystery

April 29, 2024 at 11:52AM Renée Burton, VP of threat research at Infoblox, uncovered Muddling Meerkat, a China-linked threat group evading the Great Firewall using open DNS resolvers and mail records. Their covert DNS traffic, possibly for reconnaissance or DNS denial-of-service attacks, demonstrates expertise in bypassing China’s Internet censorship. Infoblox and partners are investigating this … Read more

China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale

April 29, 2024 at 10:00AM Since October 2019, a new cyber threat, Muddling Meerkat, has used DNS activities to evade security measures and conduct network reconnaissance worldwide. Linked to China, the threat exploits DNS open resolvers and manipulates DNS queries from Chinese IP space. This sophisticated threat involves false MX record responses and may be … Read more

By proceeding you understand and give your consent that your IP address and browser information might be processed by the security plugins installed on this site.
×