
From deploying dropper files and other malware, to stealing data, or for all the communications that modern attacks use in between, threat actors are increasingly using DNS as a transport that bypasses most defenses. Join us as we examine the good, the bad, and the grey areas of DNS as a transport in this final episode of our 3-part series with Josh Kuo and Ross Gibson, authors of a new security book, “The Hidden Potential of DNS in Security.” Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Spotify, Apple Podcasts, or your favorite podcast app.
Podzilla Summary coming soon
Sign up to get notified when the full AI-powered summary is ready.
Free forever for up to 3 podcasts. No credit card required.

The Good, the Bad, and the Cybersecurity AI to Sort It All Out

Breaking Down Domain Takedown Services

Meet the Authors: Countering Redirection and Misdirection with DNS

Outsourcing Teaming, Testing, and Trust with Third Parties
Free AI-powered recaps of Infoblox ThreatTalk and your other favorite podcasts, delivered to your inbox.
Free forever for up to 3 podcasts. No credit card required.