Bug Bounty And Vuln HuntingVuln

DNS tunneling and C2 exfiltration mitigated with kernel-enforced controls

April 4, 2026Black Hat

Black Hat argues DNS must stay open on firewalls, so attackers use it for tunneling and remote commands; the talk proposes kernel-enforced DNS exfiltration security to stop DNS-based data theft at cloud scale.

Kernel-Enforced DNS Exfiltration Security
DNS-based data exfiltration via C2 channels and DNS tunneling
DNS is a foundational protocol that must remain open on firewalls
execute remote commands
DNS-based data exfiltration via C2 channels and DNS tunneling is a critical cybersecurity challenge
DNS is a foundational protocol that must remain open on firewalls.
Black Hat
dns securitydata exfiltrationcloud securitydnscloud securityencrypted dns

See what authorities are saying right now

This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new authority voices, debates, and emerging ideas.

← Back to Cyber Security