DSA-WS: How does Malware Abuse DNS?
This webinar explains how malware exploits DNS for command and control (C2) through DNS tunneling. It covers tools like Cobalt Strike, the use of Domain Generation Algorithms (DGA) to evade detection, and the limitations of DNS Response Policy Zones (RPZ). The webinar emphasizes the need for real-time DNS query analysis to detect and mitigate threats effectively.
Choose an Upcoming Event
There Are No Upcoming Events
Check back or contact your administrator to ask about future events.