by DNSFilter Team on Aug 25, 2022 12:00:00 AM
New research from cybersecurity vendor Akamai has revealed that 12.3% of monitored devices communicated with domains associated with malware or ransomware at least once during the second quarter of 2022. This represented a 3% increase compared to Q1 2022, the firm stated, with phishing toolkits playing a key role in malicious domain-related activity. The findings are based on DNS data and Akamai’s visibility into carrier and enterprise traffic across different industries and geographies.
In a blog post detailing its research, Akamai stated that, in addition to the devices it detected communicating with domains associated with malware/ransomware, a further 6.2% of devices accessed phishing domains with 0.8% accessing command-and-control (C2)-associated domains (both small increases on Q1 2022). “While this number might seem insignificant, the scale here is in the millions of devices,” the firm wrote. “When this is considered, with C2 being the most malignant of threats, this is not only significant, it’s cardinal.”
Ken Carnesi, CEO of DNSFilter, was featured in Forbes.
DNS security leader now blocks 3.8 billion requests daily to undesirable content
Today, public Wi-Fi is table stakes for the hospitality industry. Guests expect to have quality, free Wi-Fi at any hotel they go to. In fact, a recent study from Hospitality Technology magazine found that Wi-Fi is the number one amenity; respondents said they would not return to a location that offered a poor Wi-Fi experience.