Talos Takes

The various ways attackers can mess with URLs, TLDs and DNS


Listen Later

We decided to have a web navigation extravaganza this week! Guilherme Venere and Jaeson Schultz from Talos Outreach have both long been researching the ways in which bad actors try to damage users' inherent trust in the internet. Most internet users interact with the web by typing in a URL or domain name into their web browser (i.e., google.com) expecting that will take them to the right place. But attackers have found various ways to mess with that series of handshakes that must take place. Guilherme and Jaeson talk to Jon about their past years of research into typosquatting domains, new TLDs that open up the door to data leaks, DNS manipulation and more.

Additional reading:

  • ".Zip" top-level domains draw potential for information leaks
  • DNS Hijacking Abuses Trust In Core Internet Service
  • Sea Turtle keeps on swimming, finds new victims, DNS hijacking techniques
  • Security implications of misconfigurations
  • Domain dumpster diving
...more
View all episodesView all episodes
Download on the App Store

Talos TakesBy Cisco Talos

  • 4.9
  • 4.9
  • 4.9
  • 4.9
  • 4.9

4.9

13 ratings


More shows like Talos Takes

View all
Security Now (Audio) by TWiT

Security Now (Audio)

2,007 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

649 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,031 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,109 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

191 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

Afternoon Cyber Tea with Ann Johnson by Microsoft

Afternoon Cyber Tea with Ann Johnson

41 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

138 Listeners

Threat Vector by Palo Alto Networks by Palo Alto Networks and N2K Networks

Threat Vector by Palo Alto Networks

40 Listeners