{"id":7566,"date":"2019-05-02T10:08:23","date_gmt":"2019-05-02T14:08:23","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=7566"},"modified":"2019-05-30T08:51:17","modified_gmt":"2019-05-30T12:51:17","slug":"four-dns-vulnerabilities-you-need-to-know-about","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/","title":{"rendered":"DNS: The Neglected Building Block, Part 2 &#8211; Four DNS Vulnerabilities You Need to Know About"},"content":{"rendered":"\n<p><em>by Ken Linscott<\/em><\/p>\n\n\n\n<p>In the first post in this series, we covered what DNS is, why it\u2019s important, and how it works. Today, we turn our attention to four ways DNS is vulnerable to attack.<\/p>\n\n\n\n<p><strong>1. DNS cache poisoning<\/strong><\/p>\n\n\n\n<p>Internet queries first go to the internet service provider (ISP), and\nif the ISP has the IP address saved (cached), the computer resolves to the\nright web location. <\/p>\n\n\n\n<p>Herein lies the first potential threat of DNS cache poisoning. If the\nISP has been compromised, cyber criminals can replace the cached IP address with\na fraudulent website they control, re-routing a company\u2019s web traffic to\ncontent of their choice.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-3-DBS-Blog-1024x576.jpg\" alt=\"\" class=\"wp-image-7567\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-3-DBS-Blog-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-3-DBS-Blog-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-3-DBS-Blog-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-3-DBS-Blog.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>2. Poor domain name management<\/strong><\/p>\n\n\n\n<p>If the ISP doesn\u2019t have the IP address cached, it will query the root\nDNS to ask it which registry to visit for the authoritative content. It\u2019s at this\nregistry level where companies are exposed to further risk and the next threat.\n<\/p>\n\n\n\n<p>There\u2019s a risk that poor domain management has led to the domain registration\nlapsing, meaning that website no longer exists, so the registry is not able to\nrespond. <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Failure to renew important domains is surprisingly\nmore common than most companies think, and in most cases is due to a poor\nchoice of registrar or not understanding the crucial role of domains in an\norganization\u2019s structure. <\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Website visitors will have a poor experience, and\nany other service within a business that\u2019s being supported by the lapsed domain\nwill no longer function\u2014most notably email, which also the most important yet\nunofficial company workflow tool.<\/li><\/ul>\n\n\n\n<p>The threat is that expired domains could be available for registration\nby others, including cyber criminals who can easily direct visitors to a spoofed\nwebsite and start using the domain to launch phishing attacks against a\ncompany\u2019s clients. And just because a domain registration has lapsed does not\nmean access to that specific company has been erased. Inbound emails from\nclients and staff of the former domain owner can be intercepted and harvested by\nbad actors for confidential information. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-4-DBS-Blog-1024x576.jpg\" alt=\"\" class=\"wp-image-7568\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-4-DBS-Blog-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-4-DBS-Blog-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-4-DBS-Blog-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-4-DBS-Blog.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>3. DNS hijacking<\/strong><\/p>\n\n\n\n<p>DNS hijacking happens at the registry and registrar level, and results\nin unauthorized modifications of the name servers on which a domain resides.\nThis means the internet query responds with the illegitimate name servers of the\ncyber criminals instead of the company that owns the domain. DNS hijacking enables\ncyber criminals to redirect company website visitors to an exact replica of the\nbrand\u2019s site to harvest confidential information from inbound emails and launch\nsophisticated phishing attacks from a once-legitimate domain to gather username\nand password credentials. <\/p>\n\n\n\n<p><strong>4. DNS shadowing<\/strong><\/p>\n\n\n\n<p>Just as in DNS hijacking, cyber criminals can direct company website\nvisitors to an exact replica of the branded site to harvest confidential\ninformation from inbound emails and launch phishing attacks. Only domain\nshadowing is a more cunning attack, as the criminal changes the zone files of a\ndomain instead of altering the name servers. They usually leave the website\nintact and add a subdomain to the zone file that can be used in a phishing\nattack, which is far more difficult to identify than a modification to the existing\nDNS or zone file.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-5-DBS-Blog-1024x576.jpg\" alt=\"\" class=\"wp-image-7569\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-5-DBS-Blog-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-5-DBS-Blog-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-5-DBS-Blog-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-5-DBS-Blog.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Next post<\/strong><\/p>\n\n\n\n<p>In our next post, we\u2019ll give you information on six more DNS\nvulnerabilities. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/email-sign-up\/\">Subscribe\nto our blog to receive notification of new posts.<\/a> <\/p>\n\n\n\n<p>Read more posts in this series:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/what-dns-is-and-how-its-vulnerable\/\">&lt;&lt;&nbsp;Part 1 &#8211; What DNS is and How it\u2019s Vulnerable<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-3\/\">&gt;&gt; Part 3 \u2013 Six More DNS Vulnerabilities That Make Security Crucial<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-4\/\">&gt;&gt; Part 4 \u2013 The Growing Threat of DNS Hijacking and Domain Shadowing<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-5\/\">>> Part 5 \u2013 Mitigating the Risks of 10 Serious DNS Vulnerabilities<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-6\/\">&gt;&gt;\nPart 6 &#8211; DNS Management is a Boardroom Discussion<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Ken Linscott In the first post in this series, we covered what DNS is, why it\u2019s important, and how it works. Today, we turn our attention to four ways DNS is vulnerable to attack. 1. DNS cache poisoning Internet queries first go to the internet service provider (ISP), and if the ISP has the [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171,521],"tags":[],"class_list":["post-7566","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNS: The Neglected Building Block, Part 2 - Four DNS Vulnerabilities You Need to Know About | CSC<\/title>\n<meta name=\"description\" content=\"by Ken Linscott In the first post in this series, we covered what DNS is, why it\u2019s important, and how it works. Today, we turn our attention to four ways\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS: The Neglected Building Block, Part 2 - Four DNS Vulnerabilities You Need to Know About | CSC\" \/>\n<meta property=\"og:description\" content=\"by Ken Linscott In the first post in this series, we covered what DNS is, why it\u2019s important, and how it works. Today, we turn our attention to four ways\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-02T14:08:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-30T12:51:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-3-DBS-Blog-1024x576.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/four-dns-vulnerabilities-you-need-to-know-about\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/four-dns-vulnerabilities-you-need-to-know-about\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"DNS: The Neglected Building Block, Part 2 &#8211; Four DNS Vulnerabilities You Need to Know About\",\"datePublished\":\"2019-05-02T14:08:23+00:00\",\"dateModified\":\"2019-05-30T12:51:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/four-dns-vulnerabilities-you-need-to-know-about\\\/\"},\"wordCount\":628,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/four-dns-vulnerabilities-you-need-to-know-about\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Slide-3-DBS-Blog-1024x576.jpg\",\"articleSection\":[\"Brand Protection\",\"Cyber security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/four-dns-vulnerabilities-you-need-to-know-about\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/four-dns-vulnerabilities-you-need-to-know-about\\\/\",\"name\":\"DNS: The Neglected Building Block, Part 2 - Four DNS Vulnerabilities You Need to Know About | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/four-dns-vulnerabilities-you-need-to-know-about\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/four-dns-vulnerabilities-you-need-to-know-about\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Slide-3-DBS-Blog-1024x576.jpg\",\"datePublished\":\"2019-05-02T14:08:23+00:00\",\"dateModified\":\"2019-05-30T12:51:17+00:00\",\"description\":\"by Ken Linscott In the first post in this series, we covered what DNS is, why it\u2019s important, and how it works. Today, we turn our attention to four ways\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/four-dns-vulnerabilities-you-need-to-know-about\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/four-dns-vulnerabilities-you-need-to-know-about\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/four-dns-vulnerabilities-you-need-to-know-about\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Slide-3-DBS-Blog-1024x576.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Slide-3-DBS-Blog-1024x576.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/four-dns-vulnerabilities-you-need-to-know-about\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS: The Neglected Building Block, Part 2 &#8211; Four DNS Vulnerabilities You Need to Know About\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS: The Neglected Building Block, Part 2 - Four DNS Vulnerabilities You Need to Know About | CSC","description":"by Ken Linscott In the first post in this series, we covered what DNS is, why it\u2019s important, and how it works. Today, we turn our attention to four ways","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/","og_locale":"en_US","og_type":"article","og_title":"DNS: The Neglected Building Block, Part 2 - Four DNS Vulnerabilities You Need to Know About | CSC","og_description":"by Ken Linscott In the first post in this series, we covered what DNS is, why it\u2019s important, and how it works. Today, we turn our attention to four ways","og_url":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-05-02T14:08:23+00:00","article_modified_time":"2019-05-30T12:51:17+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-3-DBS-Blog-1024x576.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"DNS: The Neglected Building Block, Part 2 &#8211; Four DNS Vulnerabilities You Need to Know About","datePublished":"2019-05-02T14:08:23+00:00","dateModified":"2019-05-30T12:51:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/"},"wordCount":628,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-3-DBS-Blog-1024x576.jpg","articleSection":["Brand Protection","Cyber security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/","url":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/","name":"DNS: The Neglected Building Block, Part 2 - Four DNS Vulnerabilities You Need to Know About | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-3-DBS-Blog-1024x576.jpg","datePublished":"2019-05-02T14:08:23+00:00","dateModified":"2019-05-30T12:51:17+00:00","description":"by Ken Linscott In the first post in this series, we covered what DNS is, why it\u2019s important, and how it works. Today, we turn our attention to four ways","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-3-DBS-Blog-1024x576.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-3-DBS-Blog-1024x576.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DNS: The Neglected Building Block, Part 2 &#8211; Four DNS Vulnerabilities You Need to Know About"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=7566"}],"version-history":[{"count":8,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7566\/revisions"}],"predecessor-version":[{"id":7700,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7566\/revisions\/7700"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=7566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=7566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=7566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}