Hybrid performing and cloud migration through the training course of the pandemic has led to a surge in DNS-linked attacks, with software downtime and facts theft a main consequence, in accordance to IDC.
The analyst’s 2022 International DNS Risk Report is sponsored by security seller efficientIP and compiled from interviews with above 1000 global businesses with far more than 500 employees.
The report exposed that 88% of businesses endured DNS-related attacks in excess of the earlier yr, at an typical of 7 for each responding firm.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
These include things like DNS tunnelling, phishing, malware, zero-working day exploits, DDoS attacks, DNS hijacking and cloud misconfiguration abuse. All categories saw an raise in frequency of attacks more than the past calendar year.
The DNS layer is frequently forgotten by IT teams due to the fact firewalls are set to allowlist website traffic. Even so, its around ubiquity in contemporary IT environments and insecure style make it a popular vector for attack. In simple fact, pretty much all cyber-attacks use DNS at some place in their lifecycle, according to the NCSC.
The dangers connected with DNS have only grown in the course of the pandemic, IDC argued.
“Hybrid work types have established new challenges for IT teams. With the disappearance of the perimeter, both equally attack surface area and cloud usage have greater considerably,” it famous.
“Survey results present that the number and dimensions of attacks continue being extremely substantial, and cyber-criminals are employing all readily available instruments to acquire obtain to networks, disrupt operations, and steal details by leveraging vulnerabilities and cloud misconfigurations.”
Some 70% of respondents said they endured software downtime as a result of DNS attacks – each related to in-house and cloud-dependent applications. A quarter (24%) had consumer facts or delicate IP stolen.
This contributed to normal expenses of $942,000 per attack, the report claimed. This is nearly unchanged from the $950,000 cited in previous year’s report.
Some components of this article are sourced from:
www.infosecurity-journal.com