{"id":26723,"date":"2021-11-22T12:40:32","date_gmt":"2021-11-22T11:40:32","guid":{"rendered":"https:\/\/www.tecsens.com\/what-is-a-dns-attack-and-how-to-prevent-it\/"},"modified":"2021-11-22T12:40:37","modified_gmt":"2021-11-22T11:40:37","slug":"what-is-a-dns-attack-and-how-to-prevent-it","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/","title":{"rendered":"What is a DNS attack and how to prevent it"},"content":{"rendered":"\n<p>In recent years we have experienced the incessant growth of attacks on all kinds of companies, but especially on large and well-known companies, which a priori seemed unbreakable. According to the International Security Council (NISC) 72% of these organizations have an attack has been directly to the DNS system. Which is turning these types of attacks into an increasing threat. Let&#8217;s see what a DNS attack is and how to avoid it.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>What is a DNS attack?<\/strong><\/h2>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>The <strong>DNS (Domain Name System)<\/strong> acts as<strong>a raductor of the information that we indicate in the search engine to access a web page.<\/strong> For example, when we put <a href=\"http:\/\/www.tecsens.com\">www.tecsens.com<\/a> <strong>translates it to the IP that corresponds to connect.<\/strong> So the <strong>DNS attack <\/strong> <strong>consists of attacking the name resolution servers.<\/strong> This would produce errors and malfunctions in the systems, even the complete fall of them, in most cases it is used to steal personal information of the company or credentials.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tecsens DNS Filter<\/a><\/div>\n<\/div>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Types of DNS attacks<\/strong><\/h2>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\">DNS Poisoning:  <\/h3>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>This is one of the <strong>most frequent attacks,<\/strong>its<strong> main objective is to apprehend users through fake and malicious websites to get their personal data.<\/strong> This type of attack is one of the most effective bridges to attack since it redirects the user to a poisoned DNS without the user being aware since a priori it is quite similar to the &#8220;original&#8221;.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h4 class=\"wp-block-heading\">How to prevent and mitigate a DNS Poisoning attack?<\/h4>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li>Configuring DNS servers to review other DNS servers before redirecting to them. This allows hackers less likely to alter the DNS settings and record of servers.<\/li><li>Restricting FAQs, storing data only associated with the requested domain, and restricting questions to information that comes only from the requested domain.<\/li><li>Use of DNS protection tools that have the function of data authenticity.<\/li><\/ul>\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\">Botnets:<\/h3>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>This type of attack <strong>aims to render a DNS server inoperative.<\/strong> Each bot is programmed to send various requests for access to a web resource recognized by the DNS server that is attacked, which causes its saturation and subsequent inactivity. They basically run DDoS.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h4 class=\"wp-block-heading\"><strong>\u00bf<\/strong> How to prevent and mitigate a DNS Botnets attack?<\/h4>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li>Verification of vulnerabilities of networked devices, review of security settings.<\/li><li>Have <strong>IDS\/IPS security solutions<\/strong> to identify these types of attacks.<\/li><\/ul>\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">IDS\/IPS Tecsens<\/a><\/div>\n<\/div>\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\">Flood:<strong> <\/strong><\/h3>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>This type of attack<strong> aims to overload the DNS server so that it can no longer process the requests it receives.<\/strong> They are usually controllable since they come from a single IP address, although it can be complicated if it becomes a DDoS.<\/p>\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\">Ca<strong>ch\u00e9 Poisoning:<\/strong><\/h3>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>This attack <strong>aims at all the information stored on the DNS server and its collection (bank details, keys etc).<\/strong> The way to deceive the user is one of the most effective since they are victims of phishing, users at all times think they are accessing a legitimate website, for example, that of their bank.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h4 class=\"wp-block-heading\"><strong>How to prevent and mitigate a Cach\u00e9 Poisoning attack?<\/strong><\/h4>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li>Restrict frequent requests and limit DNS request responses to actual information associated with the domain.<\/li><li>Storage of DNS records associated with domain names.<\/li><\/ul>\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>D<\/strong>rDoS (Denial of Service Distributed by Reflection):  <\/h3>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>In this type of attack <strong>the DNS server receives as many malicious requests as legitimate, when it reaches its maximum capacity the server begins to discard packets including legitimate requests which gets it to stop responding.<\/strong> In this variant of DDoS the servers can belong to different networks since they act as reflectors so it becomes a large-scale attack taking control of all connected devices.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h4 class=\"wp-block-heading\"><strong>How to<\/strong>prevent and mitigate a DrDoS attack?<\/h4>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>These types of attacks are very difficult to mitigate, but there are prevention measures that in the long term can protect from them.<\/p>\n\n<ul class=\"wp-block-list\"><li>Location of DNS servers in different data centers (which have several alternative access routes in addition to the main one and do not have security holes) and that are part of different networks or subnets of the organization.<\/li><\/ul>\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>These DNS attacks among other existing ones cause great damage to the companies victims of these, assuming incalculable losses. As we mentioned at the beginning during these last years many well-known companies have suffered them so that no one is exempt from suffering them.  <\/p>\n\n<h3 class=\"wp-block-heading\">The security of your infrastructure is not an option, do not play it.<\/h3>\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/en\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">Request Security Consulting<\/a><\/div>\n<\/div>\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent years we have experienced the incessant growth of attacks on all kinds of companies, but especially on large and well-known companies, which a priori seemed unbreakable. According to the International Security Council (NISC) 72% of these organizations have an attack has been directly to the DNS system. Which is turning these types of [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":26670,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[500,503,504],"tags":[113,138,392,576,180,382],"class_list":["post-26723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-en","category-consulting-en","category-it-security","tag-cloud-en","tag-consultoria-en","tag-cybersecurity","tag-dns-en","tag-network-en","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a DNS attack and how to prevent it - Tecsens -<\/title>\n<meta name=\"description\" content=\"72% of organizations have suffered a DNS attack. Which is making this a growing threat. What is a DNS attack and how to avoid it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a DNS attack and how to prevent it - Tecsens -\" \/>\n<meta property=\"og:description\" content=\"72% of organizations have suffered a DNS attack. Which is making this a growing threat. What is a DNS attack and how to avoid it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-22T11:40:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-22T11:40:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/11\/TECSENS_Ataques-DNS-10-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1442\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"What is a DNS attack and how to prevent it\",\"datePublished\":\"2021-11-22T11:40:32+00:00\",\"dateModified\":\"2021-11-22T11:40:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/\"},\"wordCount\":717,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/11\/TECSENS_Ataques-DNS-10-scaled.jpg\",\"keywords\":[\"Cloud\",\"Consultancy\",\"Cybersecurity\",\"DNS\",\"network\",\"Security\"],\"articleSection\":[\"Cloud\",\"Consulting\",\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/\",\"url\":\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/\",\"name\":\"What is a DNS attack and how to prevent it - Tecsens -\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/11\/TECSENS_Ataques-DNS-10-scaled.jpg\",\"datePublished\":\"2021-11-22T11:40:32+00:00\",\"dateModified\":\"2021-11-22T11:40:37+00:00\",\"description\":\"72% of organizations have suffered a DNS attack. Which is making this a growing threat. What is a DNS attack and how to avoid it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/11\/TECSENS_Ataques-DNS-10-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/11\/TECSENS_Ataques-DNS-10-scaled.jpg\",\"width\":2560,\"height\":1442,\"caption\":\"DNS attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a DNS attack and how to prevent it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a DNS attack and how to prevent it - Tecsens -","description":"72% of organizations have suffered a DNS attack. Which is making this a growing threat. What is a DNS attack and how to avoid it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/","og_locale":"en_US","og_type":"article","og_title":"What is a DNS attack and how to prevent it - Tecsens -","og_description":"72% of organizations have suffered a DNS attack. Which is making this a growing threat. What is a DNS attack and how to avoid it.","og_url":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/","og_site_name":"Tecsens","article_published_time":"2021-11-22T11:40:32+00:00","article_modified_time":"2021-11-22T11:40:37+00:00","og_image":[{"width":2560,"height":1442,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/11\/TECSENS_Ataques-DNS-10-scaled.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"What is a DNS attack and how to prevent it","datePublished":"2021-11-22T11:40:32+00:00","dateModified":"2021-11-22T11:40:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/"},"wordCount":717,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/11\/TECSENS_Ataques-DNS-10-scaled.jpg","keywords":["Cloud","Consultancy","Cybersecurity","DNS","network","Security"],"articleSection":["Cloud","Consulting","IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/","url":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/","name":"What is a DNS attack and how to prevent it - Tecsens -","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/11\/TECSENS_Ataques-DNS-10-scaled.jpg","datePublished":"2021-11-22T11:40:32+00:00","dateModified":"2021-11-22T11:40:37+00:00","description":"72% of organizations have suffered a DNS attack. Which is making this a growing threat. What is a DNS attack and how to avoid it.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/11\/TECSENS_Ataques-DNS-10-scaled.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/11\/TECSENS_Ataques-DNS-10-scaled.jpg","width":2560,"height":1442,"caption":"DNS attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/en\/what-is-a-dns-attack-and-how-to-prevent-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/en\/"},{"@type":"ListItem","position":2,"name":"What is a DNS attack and how to prevent it"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/26723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/comments?post=26723"}],"version-history":[{"count":3,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/26723\/revisions"}],"predecessor-version":[{"id":26726,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/26723\/revisions\/26726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media\/26670"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media?parent=26723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/categories?post=26723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/tags?post=26723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}