Home / Industry

Subdomain Hijacking Vulnerabilities Report: One in Five DNS Records Are Left in a State in Which They Are Vulnerable to Subdomain Hijacking

Download the full report here.

Global businesses rely on the internet for everything—websites, email, authentication, voice over IP (VoIP), and more. It’s part of an organization’s external attack surface and needs to be continuously monitored for cybercrime attacks and fraud. The domain name system (DNS) is essentially the phonebook of the internet, and DNS records housekeeping is one of the worst managed tasks.

  • 21% of DNS records point to content that does not resolve; this can leave companies vulnerable to subdomain hijacking.
  • 82% of records are hosted on the cloud; this opens up more risk to businesses.
  • Some companies with large portfolios use many different cloud providers. This indicates decentralized management of their cloud providers, making it a challenge for them to have a good oversight of all their DNS records.

Download the full report here.

By CSC, We are the business behind business

We help effectively manage, promote, and secure our clients’ valuable brand assets against the threats of the online world. Leading companies around the world choose CSC as their trusted partner to gain control of their digital assets, maximize their online potential, and increase online security against brand risks.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign