CYBER Insights » THREAT INTEL: DNSBL – Using IP addresses on a DNS Blacklist can have severe implications

THREAT INTEL: DNSBL – Using IP addresses on a DNS Blacklist can have severe implications

Safety First
Image Credit: Freepik

Gibraltar: Thursday 11 July  2024 at 10:20 CET

THREAT INTEL: DNS BLACKLIST (DNSBL) – Using IP addresses on a DNS blacklist can have severe implications

By Andy Jenkinson – Guest Contributor |  Group CEO Cybersec Innovation Partners
via CYBERInsights
First for SME Cybersecurity News
Google Indexed on 110724 at 11:05 CET

#CyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #DNS #PKI

A DNS blacklist (DNSBL) is a system used to identify and is supposed to block IP addresses that are known sources of spam, phishing, malware, or other malicious activities.

When an IP address is listed on a DNSBL, it means that the address is associated with harmful activities and is flagged by servers and other services to prevent communications from these addresses.

For organizations, using IP addresses on a DNS blacklist can have severe implications. It can lead to their emails being marked as spam, blocked, or bounced, or worse. This can damage their communication capabilities and reputation.

If an organization knowingly uses Blacklisted IP addresses and a client falls victim to a phishing or malware attack as a result, the organization could be held liable for negligence.

This liability stems from failing to take appropriate measures to secure their network and protect clients from known threats. Organizations must ensure they use clean IP addresses to maintain security and avoid potential legal and reputational repercussions.

Contrary to popular belief, an organizations security responsibility and liability DOES NOT stop at their Firewall. DNS, typically outsourced along with CDN MUST be assured, controlled, and SECURE. Cloudflare state, ‘A Parent Company should check every 12 hours.”

Cybersec Innovation Partners
GCHQ
Jisc
Information Commissioner’s Office
FBI Cyber Division
Central Intelligence Agency
National Cyber Security Centre
InternetSecurity
DNS PKI

 

About Andy Jenkinson

Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech & Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset & DNS Vulnerabilities.

Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years’ experience as a hands-on lateral thinking CEO, coach, and leader. A ‘big deal’ business accelerator, and inspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering 100’s £ millions of projects within the Cyber, Technical, Risk and Compliance markets for some of the world’s largest, leading organisations. Andy has a demonstrable track record of largescale technical delivery and management within many sectors including the Professional, Managed, and Financial Services.

Translate »