Among cyber-attack techniques, what is a DGA?

What is a DGA? To evade detection, they churn out domain names and IP addresses for malware command and control servers. Learn more with BlueCat.


Published in:


An avatar of the author

Jeffrey Ip has worked in software engineering for 16 years. He has focused on leadership within technology research and development at several companies including Rogers, BlackBerry, and BlueCat Networks. He has been responsible for technical architecture, product delivery, fiscal planning, strategic innovation, and organizational management. His current interests include entrepreneurship and artificial intelligence.

Related content

Unlock DNS Redundancy with BlueCat Micetro’s xDNS

Discover how BlueCat Micetro’s xDNS Redundancy simplifies hybrid cloud DNS management, providing seamless redundancy, robust protection against DNS…

Read more

Three technical reasons to let go of legacy tools and unify your DDI

Learn with BlueCat how security by design, cloud integration, and API programmability offer three technical reasons to adopt Unified DDI.

Read more
A digital illustration of a tablet with server towers and cloud, displaying various icons related to data, technology, and artificial intelligence on a blue and pink background.

Combine BlueCat Integrity with LiveAction network observability for total awareness

Shift to proactive, intelligent network operations when you combine a DDI foundation with network performance monitoring solutions.

Read more
Micetro_ Hybrid Cloud Integration Blog

Micetro simplifies hybrid cloud DNS and IP address management

Learn how Micetro can help you simplify and streamline DNS and IP address management across hybrid and multicloud environments.

Read more