[dns-operations] FireEye reports long-running DNS hijacking campaign
matt at conundrum.com
Sat Jan 12 19:16:53 UTC 2019
On Sat, 12 Jan 2019 at 13:34, Bill Woodcock <woody at pch.net> wrote:
> The unavailability of those two things (client DNSSEC validation and DANE)
> on end systems was, ultimately, why these attacks succeeded, and Apple
> Product Security has been very responsive, now that they’ve seen it in
Do you know what that response is? Any chance we're expecting to see DANE
adoption in Apple products sometime soon?
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the dns-operations