Researchers have demonstrated yet another variant of the SAD DNS cache poisoning attack that leaves about 38% of the domain name resolvers vulnerable, enabling attackers to redirect traffic originally destined to legitimate websites to a server under their control.
“The attack allows an off-path attacker to inject a malicious DNS record into a DNS cache,” University of California researchers – Read More – The Hacker News


By |2021-11-19T01:18:43-05:00November 19th, 2021|