Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/14/2017
11:18 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains

SAN MATEO, Calif. and SANTA CLARA, Calif., June 14, 2017 -- Farsight Security, Inc., a leading provider of DNS Intelligence, and Infoblox Inc., the network control company that provides Actionable Network Intelligence, today announced a reseller partnership that will integrate Farsight’s Newly Observed Domains (NOD) solution with the Infoblox ActiveTrust® platform to significantly reduce the risk of cyberattacks associated with new domains.

Today cybercriminals buy, use, and discard thousands of domain names for targeted phishing campaigns, create websites to sell counterfeit goods, and commit other malicious activities. Since Farsight introduced NOD in 2014, the number of first-time domains it detects each day has tripled to over 150,000.  To fight and stay ahead of this escalating problem, users need real-time awareness of the instant these fresh sites go live.

Farsight Security observes millions of domains globally on a daily basis and provides zero-hour protection by cross-referencing these observations with Farsight DNSDB, the world’s largest historical Passive DNS database with over 35 Billion DNS resolutions.

By integrating Farsight NOD with Infoblox Threat Intelligence Data Exchange (TIDE) part of ActiveTrust, users can be blocked from communicating with new domains within minutes of a domain’s first activity, providing protection during the critical hours-to-day long window of maximum vulnerability before a reputation score can be assigned.

“The cheap cost of domains is fueling the cybercrime economy. It only takes 30 seconds for a domain name to be registered and become usable by a cybercriminal. Together, Infoblox and Farsight Security enable organizations to match threat actors’ agility in launching quick strike attacks, to better protect their businesses against potentially devastating attacks,” said Dr. Paul Vixie, Farsight Security CEO and Cofounder.

“Through our Technology Alliance Partner Program (TAP), Infoblox is able to integrate with complementary security solutions like Farsight NOD to help better protect organizations from cyber threats,” said Kanaiya Vasani, Infoblox Vice President of Corporate and Business Development. 

“Infoblox ActiveTrust platform provides organizations rich contextual threat information and actionable insight about cyberattacks against their specific networks. Farsight Security is a natural partner for Infoblox and we look forward to successfully delivering Newly Observed Domains to our customers to increase the speed and accuracy of their attack detection and mitigation.”

 

Farsight NOD and Infoblox TIDE Solution Benefits:

Zero-Hour Protection: Near real time protection against newly observed domains which may be malicious.

Malware Containment: Protect against malware infection and exfiltration of intellectual property by blocking outbound connections to NODs.

Brand Protection: Take immediate action in case of suspected brand phishing, confusion or dilution when NODs are detected. New domains are often used to trick users by creating a lookalike site which takes users to a malicious site.

Rapid Threat Investigation. Leverage Infoblox Dossier® search tool to gain threat context to NODs when researching suspicious domains, enabling users to prioritize action and block NODs immediately.

 

Availability

Farsight NOD is available to ActiveTrust licensees via the Infoblox Threat Intelligence Data Exchange as an additional subscription service.

Current Farsight NOD customers, who are also ActiveTrust users, will be able to access NOD via the Infoblox Threat Intelligence Data Exchange to take advantage of the integration.

 

A Special Live DNS Event June 20, 2017: You Are Invited

On June 20, 2017, Infoblox Chief DNS Architect Cricket Liu and DNS luminary and Farsight Security CEO Paul Vixie will participate in a live, interactive videocast as part of “Cricket Liu Live,” a special event series hosted by Infoblox.  In this videocast, Cricket and Paul will discuss how to build a strong DNS defense with Response Policy Zones and other methods. The videocast will be followed by hands-on events at select locations around the country. Don’t miss this exclusive event -- register here.

 

About the Infoblox Technology Alliance Partner Program

The Infoblox Technology Alliance Partner Program is designed to meet customer demand for solutions that can seamlessly share data and intelligence and integrate with existing workflow and infrastructure.

Through this program Infoblox can help lower the cost of integration, reduce the friction associated with tying together multiple, disparate systems, and increase the value of existing investments in security, next-generation data centers, and network infrastructure.

https://www.infoblox.com/partners/technology-partners/

 

About Infoblox

Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. As the industry leader in DNS, DHCP, and IP address management, the category known as DDI, Infoblox (www.infoblox.com) provides control and security from the core—empowering thousands of organizations to increase efficiency and visibility, reduce risk, and improve customer experience.

 

About Farsight Security, Inc.

Farsight Security, Inc. provides the world’s largest real-time threat intelligence on changes to the Internet. Leveraging proprietary technology with over 200,000 DNS resolutions/second, Farsight provides the Internet’s view of an organization and how it is changing purposely, inadvertently or maliciously. For more information on Farsight Security, Inc., please visit https://farsightsecurity.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12868
PUBLISHED: 2019-06-18
app/Model/Server.php in MISP 2.4.109 allows remote command execution by a super administrator because the PHP file_exists function is used with user-controlled entries, and phar:// URLs trigger deserialization.
CVE-2019-12865
PUBLISHED: 2019-06-17
In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command.
CVE-2017-10720
PUBLISHED: 2019-06-17
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the desktop application used to connect to the device suffers from a stack overflow if more than 26 characters are passed to it as the Wi-Fi name. This application is installed o...
CVE-2017-10721
PUBLISHED: 2019-06-17
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the device has Telnet functionality enabled by default. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car ga...
CVE-2017-10722
PUBLISHED: 2019-06-17
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the desktop application used to connect to the device suffers from a stack overflow if more than 26 characters are passed to it as the Wi-Fi password. This application is install...