DNS abuse combined with redirection seems to be gaining popularity as a stealth mechanism. We’ve just seen Decoy Dog employ the same tactic.
Source: CircleID
DNS abuse combined with redirection seems to be gaining popularity as a stealth mechanism. We’ve just seen Decoy Dog employ the same tactic.
Source: CircleID