Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • DNS: The Secret Weapon CISOs May Be Overlooking In the Fight Against Cyberattacks
  • Security Week

DNS: The Secret Weapon CISOs May Be Overlooking In the Fight Against Cyberattacks

Danelle Au Published: April 8, 2025 | Updated: April 8, 2025 4 min read
0 views

As the threat landscape grows more sophisticated, Chief Information Security Officers (CISOs) are continuously searching for innovative ways to safeguard their organizations. Yet one of the most potent tools in their arsenal remains underutilized – DNS (domain name systems).

But first, let’s first talk about the important role DNS plays in every network. Domains are the first thing users, devices, and workloads query to communicate with resources across the internet. DNS is the phone book of the Internet, resolving domains such as www.*anydomainname*.com to IP addresses that computers and servers can understand.

While often relegated to a purely functional role, DNS offers unparalleled opportunities for preemptive defense against cyberattacks. When harnessed correctly, DNS is the first line of defense. It can stop attacks before they succeed, disrupt command-and-control (C2) communications and data exfiltration, and provide invaluable insights for security operations centers (SOCs) during incident response. DNS in fact can also extend to secure every part of your network, from endpoints to cloud workloads and IoT/OT.

In fact, in 2020, the NSA started a pilot on protective DNS (they used the term “secure DNS” at the time) and concluded that they were able to reduce the ability of 92% of malware attacks to successfully deploy malware on a given network.

Evolution Of AI-Powered Cyber Threats

The majority of security solutions today are right of “Boom” — reacting only after an attack has happened. When an initial infection happens (patient zero), security teams analyze the malware, domain or exploit and generate a signature or indicator of compromise (IOC) based on the attack. This signature or IOC is distributed to endpoint detection tools, antivirus solutions or intrusion detection systems, and shows up in VirusTotal and OSINT (open source intelligence) tools. The rest of the industry can now block this attack, because of this first victim or infection.

The rise of AI in the hands of cybercriminals has dramatically reshaped the threat landscape. Threat actors now leverage AI to:

  • Generate polymorphic malware: AI-driven malware continuously evolves its code to evade signature-based detection, making traditional security tools ineffective against rapidly morphing threats.
  • Automate phishing campaigns: AI crafts highly personalized phishing emails and generates fake websites that mimic legitimate ones with alarming accuracy, increasing the success rate of attacks.
  • Scale malicious infrastructure: AI-powered tools allow cybercriminals to rapidly create new domains, IP addresses, and hosting services, making detection and takedown efforts far more challenging. Registered domain generation algorithms (RDGAs) are a programmatic mechanism that allows threat actors to create many domain names at once or over time and register them for use in their infrastructure.

As a result, every threat and malware variant may be unique and highly targeted, forcing security teams to combat hundreds of thousands—or even millions—of patient zeros. Existing solutions simply cannot keep up–it would be like playing a cybersecurity game of whack-a-mole. This shift necessitates a different approach to cybersecurity.

DNS as a Preemptive Cybersecurity Weapon

Advertisement. Scroll to continue reading.

DNS is the earliest point of detection and prevention for all cyber threats because it almost always starts with a DNS query to a malicious domain. Protective DNS, with its ability to monitor, analyze and preemptively block that first query, offers a powerful left of “Boom” approach to thwart cyberthreats.

Let’s walk through a typical ransomware kill chain and how protective DNS can help:

  • Phishing – An initial attack may start with phishing emails and malicious ads. Protective DNS can block access to these malicious domains that are linked to phishing, drive-by downloads, and exploit kits. By proactively blocking access to these domains, organizations can reduce the possibility of initial compromise, ensuring no endpoint becomes patient zero.
  • C2 communications – While the initial compromise may have been stopped by blocking access to malicious domains (as described above), there may be malware that is already on the network. To receive encryption keys, additional payloads and attack instructions, malware reaches out to an external server known as a command and control (C2). Protective DNS disrupts C2 communications by blocking access to domains used for command and control.
  • Data exfiltration – Finally, during the last phase of the kill chain, threat actors often use DNS tunneling to exfiltrate sensitive data. By encoding data in DNS queries, attackers bypass traditional security measures. Protective DNS tools can analyze query patterns and detect anomalies, stopping data exfiltration attempts in their tracks.

With advances in machine learning and artificial intelligence (AI), protective DNS technology continues to evolve. CISOs and security leaders should look for solutions that combine protective DNS with DNS-centric threat intelligence and AI to uncover traffic distribution systems (TDS) used by threat actors, disrupting their infrastructure at scale rather than taking down one domain at a time. Innovative solutions can also identify zero-day DNS threats– where newly registered domains are activated within minutes of registration, and domain generation algorithms (DGA and registered DGA), where malware cycles through several pseudo-random domains.

Next Step: Evaluating Protective DNS

We are in an era where AI-powered cyberthreats and asymmetric warfare give threat actors unprecedented speed, scale and adaptability. DNS, often treated as a mundane network function, is in fact an extremely powerful weapon that can proactively defend against phishing, malware, and data exfiltration. For CISOs, the value is clear: it’s time to elevate DNS from a background role to a frontline preemptive weapon against cyberattacks.  Conduct assessments to determine the best solutions and the best platform to deploy.

About The Author

Danelle Au

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: Anecdotes Raises $30 Million for Enterprise GRC Platform
Next: Vulnerability Management Firm Spektion Emerges From Stealth With $5 Million in Funding

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.