The Ring of Defense

What even is a DGA anyway?


Listen Later

Domain Generating Algorithms (DGA): 
- Threat actors often rely on domain-generating algorithms to circumvent traditional URL filtering to establish a malicious connection with a deployed payload. But do you know what DGAs are, or how to protect against them?

The 3CX Supply Chain Attack
- On March 29th, a new supply chain attack was identified targeting 3CX, a VoIP IPXS developer. This exploit used a 10-year-old Microsoft vulnerability (CVE-2013-3900) that makes executables appear to be legitimately signed by Microsoft while, in fact, they are being used to distribute malware. How did this happen, and how can you prevent this from being a problem in your business environment?

...more
View all episodesView all episodes
Download on the App Store

The Ring of DefenseBy Robin Johns and Bill Carter