Threat actors are using DNS tunneling to track victims’ interaction with spam and to scan network infrastructures. The post ctors are using DNS tunnel…
First seen on securityweek.com
Jump to article: www.securityweek.com/attackers-use-dns-tunneling-to-track-victim-activity-scan-networks/