{"id":7597,"date":"2019-05-09T11:56:43","date_gmt":"2019-05-09T15:56:43","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=7597"},"modified":"2019-05-30T08:52:48","modified_gmt":"2019-05-30T12:52:48","slug":"dns-the-neglected-building-block-part-3","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/","title":{"rendered":"DNS: The Neglected Building Block, Part 3 -Six More DNS Vulnerabilities That Make Security Crucial"},"content":{"rendered":"\n<p><em>by Ken Linscott<\/em><\/p>\n\n\n\n<p>In our last post, we uncovered four vulnerabilities in DNS security, but those weren\u2019t all the risks companies need to be aware of. There are six more threats to authoritative DNS, so that\u2019s where we continue with this post.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DBS-Slide-6-1024x576.jpg\" alt=\"\" class=\"wp-image-7598\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DBS-Slide-6-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DBS-Slide-6-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DBS-Slide-6-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DBS-Slide-6.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>5. DNS outage<\/strong><\/p>\n\n\n\n<p>The obvious risk to any business is a DNS outage. That means the DNS a\nbusiness is using does not resolve every second every day, and the business services\nthat rely on DNS\u2014such as websites, email, voice over IP, and virtual private\nnetworks, to name a few\u2014are intermittent. That negatively impacts a company\u2019s ability\nto operate, because in this day and age, global entities require 100% uptime.<\/p>\n\n\n\n<p>According to International Data Corporation<a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/idc-study-the-cost-of-downtime\/\">[1]<\/a>, the average total cost of unplanned application downtime is between $1.25B and $2.5B annually for Fortune 1000 companies, making the average hourly cost of an infrastructure failure about $100K, while a critical application failure is between $500K and $1M per hour.<\/p>\n\n\n\n<p>An outage could be caused by a failure within the DNS provider\u2019s system\nor process, or by a distributed denial of service (DDoS) attack against the\nDNS. A DDoS attack occurs when multiple systems flood the bandwidth of the\ntargeted system resulting in failure of any related services it supports.<\/p>\n\n\n\n<p><strong>6. Zero-day attacks<\/strong><\/p>\n\n\n\n<p>A zero-day attack is levied against a DNS vulnerability, defect, or bug\nunknown to the DNS provider until hackers leverage the flaw to take it down. In\nthe cyber world, a zero-day attack is typically accomplished using free, open-source\nsoftware that allows cyber criminals to more closely examine how the targeted software\nworks, finding the defects to exploit them. <\/p>\n\n\n\n<p>Even when zero-day vulnerability patches are released, the majority of companies don\u2019t implement all the patches, leaving themselves vulnerable to attack. A survey by Ponemon Institute<a href=\"http:\/\/servicenow.com\/content\/dam\/servicenow-assets\/public\/en-us\/doc-type\/resource-center\/analyst-report\/ponemon-state-of-vulnerability-response.pdf\">[2]<\/a> of nearly 3,000 cyber security professionals from across the globe found that 57% of breaches were due to a known vulnerability with a patch they did not apply. This is an even bigger challenge for companies running their own DNS. It\u2019s essential that a DNS provider stays ahead of new attack vectors, test for vulnerability regularly, and exceed industry standards.<\/p>\n\n\n\n<p><strong>7. Malware<\/strong><\/p>\n\n\n\n<p>Malware is a general term covering different types of threats to\ncomputer safety such as viruses, spyware, worms, trojans, and ransomware. A\nmalware attack is a cyber attack in which malicious software is covertly\ninstalled on a computer to perform activities that steal private information,\nconfidential credentials, ruin computer systems altogether, or lock down\ninformation until a sum is paid by the affected company to restore function. <\/p>\n\n\n\n<p>Computer systems become infected when a user clicks on a link from a\nphishing email, visits an infected site, downloads an infected attachment, or\nconnects to an infected external drive. Palo Alto Networks found more than 80%\nof malware attacks use DNS as the primary command and control channel to avoid\ndetection.<\/p>\n\n\n\n<p>Most malware-generated traffic can be detected and blocked at the\nnetwork level by firewalls or intrusion prevention systems. But that\u2019s not possible\nfor a malware attack on DNS, because DNS isn\u2019t filtered or inspected by traffic\nmonitoring solutions, and traffic flows freely through most networks, making it\nthe perfect conduit for cyber crime. Recently, the increasing use of digital\ncertificates by cyber criminals means that malware hides in fraudulent, but\nsecure, sites\u2014with the consumer assumption being that encrypted data is\nlegitimate and safe.<\/p>\n\n\n\n<p><strong>8. DNS tunneling<\/strong><\/p>\n\n\n\n<p>DNS tunneling takes the malware attack method a step further. Tunneling\nencodes the data of other programs or protocols in DNS queries and responses to\nextract a company\u2019s data via their own DNS infrastructure.<\/p>\n\n\n\n<p><strong>9. Distributed denial of service\nattacks<\/strong><\/p>\n\n\n\n<p>We\u2019ve already covered DDoS attacks against DNS, but there is also a\nrisk of DDoS attacks against servers running business functions like hosting a\nwebsite or a database. Although not targeting your DNS, this attack would use a\ncompany\u2019s DNS to make requests, and if successful, could take down servers\ninvolved in every step of your business.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DBS-Slide-7-1024x576.jpg\" alt=\"\" class=\"wp-image-7599\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DBS-Slide-7-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DBS-Slide-7-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DBS-Slide-7-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DBS-Slide-7.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>10. Poor digital certificate\nmanagement<\/strong><\/p>\n\n\n\n<p>Finally, imagine visiting a website with a warning to distrust the site,\nor the browser disallows reaching the site at all. If everything within the DNS\nworks perfectly, poor digital certificate management could still undermine an\norganization\u2019s credibility, leave a website vulnerable to data theft resulting\nin audit failure and non-compliance with the EU\nGeneral Data Protection Regulation, as well as other government data privacy\nregulations.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DBS-Slide-8-1024x576.jpg\" alt=\"\" class=\"wp-image-7600\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DBS-Slide-8-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DBS-Slide-8-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DBS-Slide-8-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DBS-Slide-8.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The complex nature of DNS means there are many vulnerabilities that can\nlead to DNS failing to properly support and protect a company\u2019s online\npresence.<\/p>\n\n\n\n<p><strong>Next post<\/strong><\/p>\n\n\n\n<p>In our next post, we\u2019ll take a deep dive into one of the biggest vulnerabilities\nwe\u2019ve outlined\u2014DNS hijacking\u2014examining the ways an attack could be launched\nagainst your business, and how to prevent it. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/email-sign-up\/\">Subscribe\nto our blog to receive notification of new posts.<\/a> <\/p>\n\n\n\n<p><strong>Read more posts in this series:<\/strong><\/p>\n\n\n\n<p> <a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/what-dns-is-and-how-its-vulnerable\/\">&lt;&lt;&nbsp;Part 1 \u2013 What DNS is and How it\u2019s Vulnerable<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/\">&lt;&lt; Part 2 \u2013 Four DNS Vulnerabilities You Need to Know About<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-4\/\">&gt;&gt; Part 4 \u2013 The Growing Threat of DNS Hijacking and Domain Shadowing<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-5\/\">>> Part 5 \u2013 Mitigating the Risks of 10 Serious DNS Vulnerabilities<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-6\/\">&gt;&gt;\nPart 6 &#8211; DNS Management is a Boardroom Discussion<\/a><\/p>\n\n\n\n<hr \/>\n\n\n\n<p>[1 ]<a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/idc-study-the-cost-of-downtime\/\"><em>techrepublic.com\/resource-library\/whitepapers\/idc-study-the-cost-of-downtime\/<\/em><\/a><em> <\/em><\/p>\n\n\n\n<p>[2 ]<a href=\"http:\/\/servicenow.com\/content\/dam\/servicenow-assets\/public\/en-us\/doc-type\/resource-center\/analyst-report\/ponemon-state-of-vulnerability-response.pdf \">s<em>ervicenow.com\/content\/dam\/servicenow-assets\/public\/en-us\/doc-type\/resource-center\/analyst-report\/ponemon-state-of-vulnerability-response.pdf <\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Ken Linscott In our last post, we uncovered four vulnerabilities in DNS security, but those weren\u2019t all the risks companies need to be aware of. There are six more threats to authoritative DNS, so that\u2019s where we continue with this post. 5. DNS outage The obvious risk to any business is a DNS outage. [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171,521],"tags":[],"class_list":["post-7597","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNS: The Neglected Building Block, Part 3 -Six More DNS Vulnerabilities That Make Security Crucial | CSC<\/title>\n<meta name=\"description\" content=\"by Ken Linscott In our last post, we uncovered four vulnerabilities in DNS security, but those weren\u2019t all the risks companies need to be aware of. There\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS: The Neglected Building Block, Part 3 -Six More DNS Vulnerabilities That Make Security Crucial | CSC\" \/>\n<meta property=\"og:description\" content=\"by Ken Linscott In our last post, we uncovered four vulnerabilities in DNS security, but those weren\u2019t all the risks companies need to be aware of. There\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-09T15:56:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-30T12:52:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DBS-Slide-6-1024x576.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-3\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-3\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"DNS: The Neglected Building Block, Part 3 -Six More DNS Vulnerabilities That Make Security Crucial\",\"datePublished\":\"2019-05-09T15:56:43+00:00\",\"dateModified\":\"2019-05-30T12:52:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-3\\\/\"},\"wordCount\":900,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/DBS-Slide-6-1024x576.jpg\",\"articleSection\":[\"Brand Protection\",\"Cyber security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-3\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-3\\\/\",\"name\":\"DNS: The Neglected Building Block, Part 3 -Six More DNS Vulnerabilities That Make Security Crucial | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/DBS-Slide-6-1024x576.jpg\",\"datePublished\":\"2019-05-09T15:56:43+00:00\",\"dateModified\":\"2019-05-30T12:52:48+00:00\",\"description\":\"by Ken Linscott In our last post, we uncovered four vulnerabilities in DNS security, but those weren\u2019t all the risks companies need to be aware of. There\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-3\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/DBS-Slide-6-1024x576.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/DBS-Slide-6-1024x576.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS: The Neglected Building Block, Part 3 -Six More DNS Vulnerabilities That Make Security Crucial\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS: The Neglected Building Block, Part 3 -Six More DNS Vulnerabilities That Make Security Crucial | CSC","description":"by Ken Linscott In our last post, we uncovered four vulnerabilities in DNS security, but those weren\u2019t all the risks companies need to be aware of. There","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/","og_locale":"en_US","og_type":"article","og_title":"DNS: The Neglected Building Block, Part 3 -Six More DNS Vulnerabilities That Make Security Crucial | CSC","og_description":"by Ken Linscott In our last post, we uncovered four vulnerabilities in DNS security, but those weren\u2019t all the risks companies need to be aware of. There","og_url":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-05-09T15:56:43+00:00","article_modified_time":"2019-05-30T12:52:48+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DBS-Slide-6-1024x576.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"DNS: The Neglected Building Block, Part 3 -Six More DNS Vulnerabilities That Make Security Crucial","datePublished":"2019-05-09T15:56:43+00:00","dateModified":"2019-05-30T12:52:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/"},"wordCount":900,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DBS-Slide-6-1024x576.jpg","articleSection":["Brand Protection","Cyber security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/","url":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/","name":"DNS: The Neglected Building Block, Part 3 -Six More DNS Vulnerabilities That Make Security Crucial | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DBS-Slide-6-1024x576.jpg","datePublished":"2019-05-09T15:56:43+00:00","dateModified":"2019-05-30T12:52:48+00:00","description":"by Ken Linscott In our last post, we uncovered four vulnerabilities in DNS security, but those weren\u2019t all the risks companies need to be aware of. There","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DBS-Slide-6-1024x576.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DBS-Slide-6-1024x576.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DNS: The Neglected Building Block, Part 3 -Six More DNS Vulnerabilities That Make Security Crucial"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=7597"}],"version-history":[{"count":9,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7597\/revisions"}],"predecessor-version":[{"id":7703,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7597\/revisions\/7703"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=7597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=7597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=7597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}