Entries by Secure64 Software Corporation

SECURE64 INTRODUCES INDUSTRY’S FIRST DNS SERVER THAT PROTECTS NETWORK BANDWIDTH DURING DNS-BASED DENIAL-OF-SERVICE ATTACKS

DNS Authority incorporates PipeProtector™ technology to block attack traffic at upstream routers Greenwood Village, CO – March 4, 2014 — Secure64®, the leading provider of secure, self-protecting DNS server software, today announced a new release of its DNS Authority product that adds additional protection for both the DNS nameserver and the upstream network against high […]

Secure64 Deflects Denial-Of-Service Attack That Takes BIND-Based Appliance Down

[vc_row][vc_column][vc_column_text] Ability to defend against TCP SYN flood attack proves value of genetic diversity strategy Greenwood Village, CO – December 19, 2014 — Secure64®, the security company at the core of the internet, announced today that its DNS Authority product continued uninterrupted during a distributed-denial-of-service (DDoS) attack at one of its largest customers. The DDoS […]

New Year, New BIND Security Vulnerabilities.

[vc_row][vc_column width=”2/3″][vc_column_text]We are barely into the new year, and BIND users have more patching to do. Today, the Internet Software Consortium (ISC) announced the availability of patches to fix two critical BIND security vulnerabilities: • CVE-2015-8704 • CVE-2015-8705 Both of these vulnerabilities

The Grinch Comes Early for BIND Users

[vc_row][vc_column width=”2/3″][vc_column_text]The grinch showed up early for BIND users this year, in the form of two new critical security vulnerabilities that can crash BIND. The two vulnerabilities are: • CVE-2015-8000 • CVE-2015-8461 ISC has released patches of its BIND software that correct the problem. Users of BIND-based appliances from vendors such as Infoblox, Bluecat Networks, […]

When It Rains, It Pours. More BIND Vulnerabilities.

September 2, 2015 was not a good day for BIND users. Two new critical security vulnerabilities were announced today – both of them are remotely exploitable vulnerabilities that crash the server. The two vulnerabilities are: CVE-2015-5986 CVE-2015-5722 ISC has release patches of its BIND software that correct the problem. Users of BIND-based appliances from vendors such […]

Secure64 DNS Products Not Vulnerable to BIND Security Flaw

On July 28, 2015, the Internet Systems Consortium reported a critical security vulnerability in BIND, CVE-2015-5477. This vulnerability, which affects both BIND recursive and authoritative servers, is caused by an error in the handling of TKEY queries, allowing a remote attacker to crash BIND by sending a deliberately constructed query. This vulnerability is considered critical, as it cannot […]