<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>protective dns Archives | DNS Security &amp; Threat Intelligence Blog | Shreshta</title>
	<atom:link href="https://shreshtait.com/blog/tag/protective-dns/feed/" rel="self" type="application/rss+xml" />
	<link>https://shreshtait.com/blog/tag/protective-dns/</link>
	<description>DNS Security &#38; Threat Intelligence</description>
	<lastBuildDate>Wed, 01 Oct 2025 06:58:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>What is a DNS Firewall?</title>
		<link>https://shreshtait.com/blog/2024/02/dns-firewall/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Tue, 06 Feb 2024 17:03:54 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[DNS Firewall]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[dns firewall]]></category>
		<category><![CDATA[dns security]]></category>
		<category><![CDATA[protective dns]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=5691</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="what is a dns firewall" decoding="async" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1-300x300.png 300w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1-1024x1024.png 1024w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1-768x768.png 768w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1-70x70.png 70w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Gradient-geometrical-Internet-security-Instagram-Post-1.png 1080w" sizes="(max-width: 150px) 100vw, 150px" />A DNS firewall also known as Protective DNS is an enterprise network security solution. It filters and manages DNS queries and responses. It protects organizations from cyber threats. These threats include phishing, malware, cryptojacking, domain generation algorithms(DGA), command and control (C2) domain names. It determines which domain names users can access based on set rules [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/02/dns-firewall/">What is a DNS Firewall?</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Having Teen Patti fun? Beware of malware apps!</title>
		<link>https://shreshtait.com/blog/2024/02/having-teen-patti-fun-beware-of-malware-apps/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Sat, 03 Feb 2024 08:55:01 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[browse safe]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[malicious android apk]]></category>
		<category><![CDATA[protective dns]]></category>
		<category><![CDATA[teen patti fun]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=5552</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/vikas-makwana-Qx6CvJlTMys-unsplash-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Image of a man holding three cards" decoding="async" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/vikas-makwana-Qx6CvJlTMys-unsplash-150x150.jpg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/vikas-makwana-Qx6CvJlTMys-unsplash-70x70.jpg 70w" sizes="(max-width: 150px) 100vw, 150px" />Having Teen Patti fun? Beware of malware apps! Shreshta Threat Intelligence team have detected many websites providing Teen Patti game downloads infected with malware. About Teen Patti Teen Patti is a gambling card game. Teen Patti originated in India and is popular throughout South Asia. It evolved from the English game of three-card brag, with [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/02/having-teen-patti-fun-beware-of-malware-apps/">Having Teen Patti fun? Beware of malware apps!</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Recently registered domains &#8211; Free Download Daily Domains List‎</title>
		<link>https://shreshtait.com/blog/2024/02/recently-registered-domains-download/</link>
		
		<dc:creator><![CDATA[Shreshta Threat Research]]></dc:creator>
		<pubDate>Thu, 01 Feb 2024 07:27:46 +0000</pubDate>
				<category><![CDATA[Protective DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[newly registered domain names]]></category>
		<category><![CDATA[protective dns]]></category>
		<category><![CDATA[recently registered domains]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=5479</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/02/Orange-And-Purple-Illustration-Domain-Name-Registration-Facebook-Post1-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Text recently registered domain names feeds and Shreshta logo and URL" decoding="async" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/02/Orange-And-Purple-Illustration-Domain-Name-Registration-Facebook-Post1-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/02/Orange-And-Purple-Illustration-Domain-Name-Registration-Facebook-Post1-70x70.png 70w" sizes="(max-width: 150px) 100vw, 150px" />The appeal of recently registered domain names for Cybercriminals Recently registered domains or&#160;Newly registered domain names(NRD)&#160;are attractive to cybercriminals for several reasons. First, they are relatively cheap and easy to obtain, making them an ideal choice for those looking to carry out malicious activities. Second, because they are new, they have no reputation. Additionally, these [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/02/recently-registered-domains-download/">Recently registered domains &#8211; Free Download Daily Domains List‎</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>National Crime Records Bureau &#8211; Your browser has been locked</title>
		<link>https://shreshtait.com/blog/2024/01/national-crime-records-bureau-your-browser-has-been-locked/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Fri, 12 Jan 2024 07:43:19 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[domain name]]></category>
		<category><![CDATA[Government of India]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[national crime records bureau]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[police trojan]]></category>
		<category><![CDATA[protective dns]]></category>
		<category><![CDATA[scareware]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=4859</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/01/DALL·E-2024-01-12-16.50.53-A-digital-lock-symbolizing-cybersecurity-and-online-safety.-The-lock-should-appear-modern-and-high-tech-featuring-a-sleek-metallic-surface-with-intr-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/01/DALL·E-2024-01-12-16.50.53-A-digital-lock-symbolizing-cybersecurity-and-online-safety.-The-lock-should-appear-modern-and-high-tech-featuring-a-sleek-metallic-surface-with-intr-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2024/01/DALL·E-2024-01-12-16.50.53-A-digital-lock-symbolizing-cybersecurity-and-online-safety.-The-lock-should-appear-modern-and-high-tech-featuring-a-sleek-metallic-surface-with-intr-300x300.png 300w, https://shreshtait.com/blog/wp-content/uploads/2024/01/DALL·E-2024-01-12-16.50.53-A-digital-lock-symbolizing-cybersecurity-and-online-safety.-The-lock-should-appear-modern-and-high-tech-featuring-a-sleek-metallic-surface-with-intr-768x768.png 768w, https://shreshtait.com/blog/wp-content/uploads/2024/01/DALL·E-2024-01-12-16.50.53-A-digital-lock-symbolizing-cybersecurity-and-online-safety.-The-lock-should-appear-modern-and-high-tech-featuring-a-sleek-metallic-surface-with-intr-70x70.png 70w, https://shreshtait.com/blog/wp-content/uploads/2024/01/DALL·E-2024-01-12-16.50.53-A-digital-lock-symbolizing-cybersecurity-and-online-safety.-The-lock-should-appear-modern-and-high-tech-featuring-a-sleek-metallic-surface-with-intr.png 1024w" sizes="auto, (max-width: 150px) 100vw, 150px" />Executive Summary Threat actors use every method to achieve their motives. The motives vary from financial, espionage, destruction, etc. The Police Trojan website is a classic example of a website impersonating the National Crime Records Bureau with a fake message &#8220;Your browser has been locked&#8221; and using scareware techniques to make users pay for accessing [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/01/national-crime-records-bureau-your-browser-has-been-locked/">National Crime Records Bureau &#8211; Your browser has been locked</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Phishing scam aimed at Flipper Zero India enthusiasts</title>
		<link>https://shreshtait.com/blog/2024/01/flipper-zero-india-phishing-scam/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Thu, 04 Jan 2024 13:17:07 +0000</pubDate>
				<category><![CDATA[Scam]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[campaign]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[domain name]]></category>
		<category><![CDATA[flipperzero]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[protective dns]]></category>
		<category><![CDATA[shreshta]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=4788</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2024/01/images-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2024/01/images-150x150.jpeg 150w, https://shreshtait.com/blog/wp-content/uploads/2024/01/images-70x70.jpeg 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />Executive Summary Shreshta threat intelligence team has uncovered a phishing scam aimed at Flipper Zero India enthusiasts interested in buying a Flipper Zero. The phishing websites lure users with fake flipper zero discount code offers. Do you believe threat actors limit their focus solely to non-technical users? Think again! Infosec community and enthusiasts are also [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2024/01/flipper-zero-india-phishing-scam/">Phishing scam aimed at Flipper Zero India enthusiasts</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The rise of phishing attacks targeting Adobe users in India</title>
		<link>https://shreshtait.com/blog/2023/12/the-rise-of-phishing-attacks-targeting-adobe-users-in-india/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar&nbsp;and&nbsp;Pranay Patil]]></dc:creator>
		<pubDate>Tue, 26 Dec 2023 07:38:49 +0000</pubDate>
				<category><![CDATA[Protective DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[adobe]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[protective dns]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=4730</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2023/12/DALL·E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="adobe phishing attack" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2023/12/DALL·E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2023/12/DALL·E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab-300x300.png 300w, https://shreshtait.com/blog/wp-content/uploads/2023/12/DALL·E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab-768x768.png 768w, https://shreshtait.com/blog/wp-content/uploads/2023/12/DALL·E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab-70x70.png 70w, https://shreshtait.com/blog/wp-content/uploads/2023/12/DALL·E-2023-12-26-13.01.00-A-creative-image-showing-a-PDF-document-attached-to-a-fishing-hook-or-pole-symbolizing-a-phishing-attack.-The-PDF-document-should-have-an-icon-or-lab.png 1024w" sizes="auto, (max-width: 150px) 100vw, 150px" />Executive Summary Shreshta Threat Intelligence has uncovered a rise in phishing attacks targeting Adobe users in India. The attack begins by sending emails to employees working at Micro Small and Medium Enterprises(MSME), large enterprises, and luring them to click on a link which impersonates a Purchase Order or a Work Order document.  The attack uses [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2023/12/the-rise-of-phishing-attacks-targeting-adobe-users-in-india/">The rise of phishing attacks targeting Adobe users in India</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Phishing targeting Microsoft Outlook users</title>
		<link>https://shreshtait.com/blog/2023/01/phishing-target-microsoft-outlook-users/</link>
		
		<dc:creator><![CDATA[Pranay Patil]]></dc:creator>
		<pubDate>Fri, 27 Jan 2023 17:33:01 +0000</pubDate>
				<category><![CDATA[SDINET]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[protective dns]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=3799</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2023/01/pswapneel_illustration_of_a_computer_virus_in_ASCII_b3366c2e-38b5-4251-b029-5459a03ee289-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Phishing websites targeting Microsoft Outlook" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2023/01/pswapneel_illustration_of_a_computer_virus_in_ASCII_b3366c2e-38b5-4251-b029-5459a03ee289-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2023/01/pswapneel_illustration_of_a_computer_virus_in_ASCII_b3366c2e-38b5-4251-b029-5459a03ee289-70x70.png 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />Security researchers at Shreshta IT, using our threat intelligence platform SDINET, have identified a phishing website targeting users of Microsoft Outlook. About Microsoft Outlook Outlook.com is a webmail service that is part of the Microsoft 365 product family. It offers mail, calendaring, contacts, and tasks services.1 Phishing page impersonating Outlook login &#8211; www[.]newoutlook[.]email Phishing page [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2023/01/phishing-target-microsoft-outlook-users/">Phishing targeting Microsoft Outlook users</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>LK domain name abused by threat actors</title>
		<link>https://shreshtait.com/blog/2022/11/lk-domain-name/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Tue, 29 Nov 2022 07:09:04 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[.lk]]></category>
		<category><![CDATA[aol]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[domain]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[protective dns]]></category>
		<category><![CDATA[SDINET]]></category>
		<category><![CDATA[shadowing.]]></category>
		<category><![CDATA[sri lanka]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=3642</guid>

					<description><![CDATA[<p><img width="150" height="150" src="https://shreshtait.com/blog/wp-content/uploads/2022/11/DOMAIN-SHADOWING-ATTACK-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Domain shadowing attack" decoding="async" loading="lazy" srcset="https://shreshtait.com/blog/wp-content/uploads/2022/11/DOMAIN-SHADOWING-ATTACK-150x150.png 150w, https://shreshtait.com/blog/wp-content/uploads/2022/11/DOMAIN-SHADOWING-ATTACK-70x70.png 70w" sizes="auto, (max-width: 150px) 100vw, 150px" />Before we deep dive into how attackers target .lk domains using domain shadowing attack, first, a primer on registration of a domain name under .lk namespace. tl;dr registration of a domain name under .lk namespace is regulated The domain registration policy says the LK registry may ask for documents supporting the request for a domain [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2022/11/lk-domain-name/">LK domain name abused by threat actors</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Phishing Campaign &#8211; Adidas and Nike</title>
		<link>https://shreshtait.com/blog/2022/09/phishing-campaign-adidas-nike/</link>
		
		<dc:creator><![CDATA[Swapneel Patnekar]]></dc:creator>
		<pubDate>Fri, 23 Sep 2022 11:31:14 +0000</pubDate>
				<category><![CDATA[DNS]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Protective DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[adidas]]></category>
		<category><![CDATA[campaign]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[domain name]]></category>
		<category><![CDATA[india]]></category>
		<category><![CDATA[nike]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[protective dns]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://shreshtait.com/blog/?p=3062</guid>

					<description><![CDATA[<p>Shreshta threat intelligence team has detected a phishing campaign wherein the threat actors have registered domain names impersonating brands such as Adidas and Nike. Adidas AG is a German multinational corporation, founded and headquartered in Herzogenaurach, Bavaria, that designs and manufactures shoes, clothing and accessories. It is the largest sportswear manufacturer in Europe, and the [&#8230;]</p>
<p>The post <a href="https://shreshtait.com/blog/2022/09/phishing-campaign-adidas-nike/">Phishing Campaign &#8211; Adidas and Nike</a> appeared first on <a href="https://shreshtait.com/blog">DNS Security &amp; Threat Intelligence Blog | Shreshta</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Database Caching 34/73 queries in 0.014 seconds using Disk

Served from: shreshtait.com @ 2026-04-11 05:00:46 by W3 Total Cache
-->