logo
Infoblox double-down on pre-emptive protection in bid to crackdown on AI-driven attacks

Infoblox double-down on pre-emptive protection in bid to crackdown on AI-driven attacks

Tahawul Tech3 days ago
Infoblox , a leader in cloud networking and security services, has announced major enhancements to its Protective DNS solution, Infoblox Threat Defense, empowering organizations to stay ahead of sophisticated, AI-driven cyber threats with pre-emptive security.
As global cybercrime costs surge toward $23 trillion by 2027[1], traditional 'detect and respond' security tools are struggling to keep up. Modern attackers increasingly deploy AI to create unique, single-use malware and stealthy phishing campaigns that evade traditional defenses—making it more likely than ever that any organization can become 'patient zero.'
Infoblox's Protective DNS solution, Infoblox Threat Defense, stops threats before they impact infrastructure by combining predictive threat intelligence with algorithmic and machine learning-based detections — blocking high-risk and malicious domains an average of 68 days earlier than traditional tools, with an industry-leading 0.0002% false positive rate.
'The difference between most DNS security tools and our approach is like the difference between law enforcement chasing street-level drug dealers versus taking down the cartel,' said Mukesh Gupta, chief product officer, Infoblox. 'We target the suppliers behind the cyberattackers—the cartel—so threats can be blocked before they ever reach the network. This pre-emptive strategy helps security teams reduce risk, eliminate noise and stop threats at the DNS layer before they ever reach the network.'
To help customers get ahead of the new wave of AI-driven threats, Infoblox is continually delivering ground-breaking threat intelligence—solidifying the role of Threat Defense as a proactive, high-speed threat blocker. From better visibility and actionable insights to flexible licensing and clear metrics on pre-emptive protection, these new innovations are designed to help security teams close gaps before attackers can exploit them:
Protection Before Impact: Provides security leaders with clear, quantifiable metrics on threats neutralized before they can cause damage, streamlining reporting and demonstrating security ROI.
Provides security leaders with clear, quantifiable metrics on threats neutralized before they can cause damage, streamlining reporting and demonstrating security ROI. Security Workspace: An intuitive, centralized interface that gives security teams deep visibility into their environment with actionable insights to reduce risk and ultimately speed their mean time to respond (MTTR).
An intuitive, centralized interface that gives security teams deep visibility into their environment with actionable insights to reduce risk and ultimately speed their mean time to respond (MTTR). Detection Mode: Provides organizations visibility into threats they're missing today—without changing existing DNS configuration, minimizing operational risk.
Provides organizations visibility into threats they're missing today—without changing existing DNS configuration, minimizing operational risk. Asset Data Integration: Delivers deep context into what was protected as part of the pre-emptive strategy, enabling security teams to do further investigation and analysis.
Delivers deep context into what was protected as part of the pre-emptive strategy, enabling security teams to do further investigation and analysis. Token-Based Licensing: Flexible, token-based pricing aligned to protected assets simplifies procurement and drives clearer ROI.
Flexible, token-based pricing aligned to protected assets simplifies procurement and drives clearer ROI. Powering Google Cloud's DNS Armor: Infoblox's Protective DNS capabilities also power Google Cloud's DNS Armor, providing native security for cloud workloads, with public preview later this year.
Infoblox Threat Defense gives security teams predictive insights to block attacks as threat actor infrastructure is being created—before malware is even deployed and long before a patient zero is hit. Unlike traditional security tools that must wait for the first victim to detect and respond, Infoblox's approach can pre-empt the attack entirely.
By stopping attacks earlier, Infoblox reduces the load on detect-and-respond tools, such as XDR and SIEM—aligning with Gartner's view that pre-emptive cybersecurity will replace 40 percent of traditional solutions by 2028. The latest NIST SP 800-81 guidelines reinforce this shift, noting that DNS can often prevent security incidents earlier than other systems.
'Traditional 'detect and respond' security simply can't keep pace with today's AI-driven attackers and malware. Cybercrime is evolving faster than ever, costing the world trillions and exploiting gaps in legacy defenses,' said Scott Harrell, president and CEO, Infoblox. 'The legacy kill chain approach depends on someone else being 'patient zero' so those legacy systems can learn and react—but attackers today customize malware to target individual businesses or industries, rendering legacy, reactive approaches ineffective against modern AI-enabled attackers. When you're patient zero, the only thing being 'killed' is your business. The future of cybersecurity must be pre=emptive: stop threats before they ever reach your organization.'
'Before Infoblox, DNS was a blind spot in our security posture,' said Nathan Sinclair, chief information security officer for the City and County of San Francisco. 'We immediately saw value in gaining full visibility into DNS requests and the hidden threats they can carry. Infoblox Threat Defense has proven to be a powerful solution for blocking exploits and preventing incursions. It has significantly strengthened our defenses and given us greater confidence in protecting the critical services we provide.'
For deeper insights into our latest innovations and why pre-emptive DNS security matters more than ever, visit our Security Momentum launch blog. To see the latest research on evolving threats—including how DNS security blocks 82 percent of attacks before impact—read our 2025 DNS Threat Landscape Report.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Kaspersky warns of rising Efimer trojan attacks on crypto users
Kaspersky warns of rising Efimer trojan attacks on crypto users

Gulf Business

time7 hours ago

  • Gulf Business

Kaspersky warns of rising Efimer trojan attacks on crypto users

Image: Getty Images Kaspersky Security Network has reported that between October 2024 and July 2025, more than 5,000 users — including both individuals and organisations — were targeted by the Efimer trojan, a malicious program designed to steal and replace cryptocurrency wallet addresses. The campaign was particularly damaging in Brazil, which saw approximately 1,500 victims, but also impacted users in India, Spain, Russia, Italy, and Germany. Initially detected in October 2024, early versions of Efimer were spread through compromised WordPress websites. By June 2025, attackers had expanded their methods, distributing the malware via phishing emails. These emails, disguised as correspondence from a legal firm, threatened recipients with lawsuits over alleged domain name patent violations to pressure them into downloading malicious files. 'This Trojan is notable for its dual approach to spreading — targeting both individual users and corporate environments with different tactics. For private users, attackers use torrent files pretending to be popular movies to lure victims, while in corporate settings, they rely on fraudulent emails containing legal threats. Crucially, in both cases, compromise only occurs if the user actively downloads and executes the malicious file,' explained Artyom Ushkov, threat researcher at Kaspersky. Read: Kaspersky advises both corporate and individual users to avoid downloading torrent files from unverified sources, verify the legitimacy of email senders, and keep antivirus databases up to date. Users should also refrain from clicking on links or opening attachments in unsolicited emails, ensure software is regularly updated, enforce strong passwords and two-factor authentication, and continuously monitor for potential compromises. Installing a trusted security solution and following its recommendations can automatically mitigate most threats. For developers and website administrators, Kaspersky recommends implementing strong security measures to prevent unauthorised access and stop malware from propagating through their infrastructure. The full report is available on

Blockchain brings big business trust to small deals
Blockchain brings big business trust to small deals

Zawya

time8 hours ago

  • Zawya

Blockchain brings big business trust to small deals

Blockchain, often linked to cryptocurrencies and speculative bubbles, is moving beyond digital coins and is now serving as a backbone for trust and verification, tackling accountability challenges across industries. For decades, letters of credit have been the financial backbone of international trade. These complex banking instruments guarantee that a seller will be paid once goods are shipped and verified, while buyers are assured they receive exactly what they ordered. They give multinational corporations the confidence to do business across oceans and borders, knowing that a trusted financial middleman, the bank, stands behind every transaction. But for small businesses and everyday people, such safeguards have remained out of reach. Engaging banks or lawyers to underwrite a modest import deal or freelance assignment is impractical, given the costs involved. Instead, trust in small-scale transactions has often come down to handshakes, goodwill, and when things go wrong, messy disputes that sometimes end in court. Now developers at North Carolina State University have adapted blockchain-powered smart contracts, digital agreements that automatically execute once conditions are met, to give small businesses or importers, contractors, and freelancers the same level of trust and security long reserved for global corporations.'Letters of credit give big businesses confidence to trade across borders,' says Brandon McConnell, an associate research professor who helped develop the tool. 'But imagine if small businesses could tap into the same kind of assurance. Blockchain lets us do that at a scale that works for everyday people.'The university explained that at the heart of the system are smart contracts, self-executing pieces of code that run on blockchain networks. Unlike traditional contracts that depend on trust, signatures, and sometimes lawyers to enforce, smart contracts are automated. They are programmed to release funds, transfer digital assets, or trigger next steps only when pre-agreed conditions are met. Digital contractFor example, when a homeowner hires a contractor to renovate a kitchen, instead of handing over money upfront or relying on a verbal promise, the homeowner places the funds into a secure digital contract. The contract specifies milestone. Demolish old cabinets, install plumbing, finish countertops. As each milestone is verified, the smart contract automatically releases a portion of the payment. If the contractor fails to complete the work, the money stays locked. If the homeowner refuses to pay after the work is finished, the contractor still receives what is owed. Neither party has to chase lawyers or go to arbitration; the contract executes itself. This shift, says co-lead author Lt. Col. Mat Fukuzawa, could address one of the biggest problems in small-scale contracting, distrust. 'General contracting jobs are notorious for misunderstandings and disputes,' he explains. 'Today, the only fallback is litigation or arbitration, which adds cost and stress. Smart contracts could make trust the default instead of the exception.'What makes the tool particularly powerful is its flexibility. The team designed it to handle multiple layers of complexity. A single project can involve multiple smart contracts overseeing different aspects of the agreement, scope of work, payment schedules, arbitration, proof of licensing, or even insurance verification. Once both sides sign, the blockchain records the entire agreement in a tamper-proof ledger. That record cannot be altered, which prevents either party from quietly changing terms or disputing what was agreed to later. This design also allows for real-world messiness. Proof-of-concept tests showed the system can manage scenarios where contractors abandon a job halfway, clients dispute workmanship, or either side fails to meet obligations. Depending on the coded conditions, the contract can pause payments, return funds, or trigger arbitration. AccessibilityThe difference is accessibility. Banks charge significant fees to underwrite letters of credit, making them viable only for large shipments of goods worth millions of dollars. By contrast, smart contracts run at a fraction of the cost, making them practical for deals as small as a freelance design gig or a kitchen remodel. That lowered barrier could open up an entirely new layer of financial security for small businesses. 'This technology has practical utility across sectors,' McConnell says. 'Contractors, designers, freelancers … people want low-cost assurance that everyone will keep their word.'For small businesses, which often operate on thin margins and cannot afford lengthy legal battles, this kind of low-cost assurance could be transformative. Disputes that once threatened livelihoods could be prevented or resolved automatically. Freelancers, who frequently deal with late payments or clients disappearing, could work with more confidence. And homeowners taking on expensive renovations could avoid nightmare scenarios where money is lost to unreliable contractors. The team behind the project has published two open-access papers detailing their design: Implementing A Letter of Credit Style Business Process for Small-Scale Contracting Using Smart Contracts and Mechanisms for Dealing With the Unexpected in Small-Scale Contracting Using Smart Contracts. Although the potential is enormous, there is also the human factor. Not all disputes are clear-cut, and not everything can be neatly coded into software. Quality of work, for example, is often subjective. That is why the researchers have built arbitration triggers into their system, allowing for human judgment where needed. © Copyright 2022 Nation Media Group. All Rights Reserved. Provided by SyndiGate Media Inc. (

Aujas Cybersecurity rebrands as NuSummit Cybersecurity
Aujas Cybersecurity rebrands as NuSummit Cybersecurity

Khaleej Times

time9 hours ago

  • Khaleej Times

Aujas Cybersecurity rebrands as NuSummit Cybersecurity

NuSummit has announced the rebranding of its cybersecurity subsidiary Aujas Cybersecurity as NuSummit Cybersecurity. This strategic integration consolidates NuSummit's cybersecurity capabilities under a unified brand, further strengthening its leadership as a global force in cybersecurity, driven by innovation, scale, and an unwavering commitment to client-centric security solutions. Aujas Cybersecurity, known for fortifying digital enterprises since 2008, has consistently delivered cutting-edge cybersecurity solutions across identity and access management, risk assurance, application security, and managed detection and response. Operating as NuSummit Cybersecurity, the company will now build on this proven legacy with enhanced global reach and expanded capabilities. Anantharaman Sreenivasan, managing director and group CEO, NuSummit said: 'This brand integration marks a pivotal evolution, combining our deep cybersecurity expertise with the full breadth of our digital capabilities. We're not just securing systems; we're architecting intelligent security foundations that unlock new business models and enable confident innovation. As AI reshapes both opportunity and risk, NuSummit is uniquely positioned to help clients harness its full potential, safely and securely. Our enhanced value proposition is clear: empower clients to accelerate digital transformation by practicing AI in a fortified, trusted environment, where security is not a checkpoint, but a launchpad for growth. 'At NuSummit Cybersecurity, this isn't just a name change; it's a renewed commitment to purpose,' said Sameer Shelke, CEO and co-founder, NuSummit Cybersecurity. 'For over seventeen years, Aujas Cybersecurity has built a reputation for staying ahead of threats and delivering real-world solutions that work. Today, as NuSummit Cybersecurity, we're scaling that legacy, amplifying our impact with advanced capabilities, and harnessing AI to drive speed, precision, and efficiency across the cybersecurity lifecycle. We're not just evolving; we're accelerating the future of secure digital transformation.' Varun Laul, partner at Investcorp, said: 'The integration of Aujas Cybersecurity into NuSummit Cybersecurity is a strategic leap forward in solidifying NuSummit's position as a global leader in cybersecurity. As the world faces a new era of cyber threats, NuSummit Cybersecurity is uniquely equipped to provide intelligent, scalable solutions that address the complex demands of today's digital ecosystem. We are proud to continue backing NuSummit's growth and success in this crucial space." As organisations race to embrace digital transformation, NuSummit Cybersecurity stands at the convergence of trust and technology. Its focused investments in next-gen cybersecurity controls and responsible AI integration are set to define the next chapter in cybersecurity. From enabling the world's largest citizen identity programme to safeguarding financial giants and telecom enterprises, the company has built a formidable portfolio that speaks to its differentiated approach and client-first ethos.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store