By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New DNS Armor Service Helps Google Cloud Workloads Preemptively Block Cyber Threats
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > New DNS Armor Service Helps Google Cloud Workloads Preemptively Block Cyber Threats
News

New DNS Armor Service Helps Google Cloud Workloads Preemptively Block Cyber Threats

News Room
Last updated: 2025/10/05 at 6:27 AM
News Room Published 5 October 2025
Share
SHARE

Google Cloud has launched DNS Armor, a new cloud-native security service developed in partnership with Infoblox. The service provides a foundational layer of security by preemptively detecting and mitigating DNS-based threats originating from Google Cloud workloads. The offering addresses a critical vulnerability, with one of Infoblox’s own studies finding that 92% of malware utilizes the Domain Name System (DNS) for command and control (C2) communications.

Google describes the service as preemptive threat detection for internet-bound DNS queries initiated from Google Cloud workloads. Moreover, the company states that it complements its cloud-first network security product portfolio by offering a foundational security layer that identifies DNS-based threats, including requests to malicious command and control (C2) servers, DNS tunneling for the exfiltration of sensitive data, and malware using DNS queries.

Essential DNS Armor provides feed-based detection, identifying both known malicious and high-risk domains, as well as newly registered domains that are likely to be used for malicious attacks. Additionally, it provides algorithm-based threat detection utilizing machine-learning-based detection techniques, including the detection of DNS tunneling attacks, to prevent unauthorized data exfiltration.

The authors of a Google blog post write:

Many sophisticated cyberattacks establish a network connection with their command and control environment. You can use DNS Armor to get visibility into the earliest indicators of suspicious and malicious domains by detecting C2 activity, connections to malware distribution sites, and Domain Generation Algorithm (DGA) traffic originating from your workloads. 

The focus on DNS is crucial as Michael, an IT Generalist and Network architect, tweeted on X:

DNS seems like an odd area to talk security till you realize that DNS is often the first step in communications in any threat vector, from phishing to C&C botnet traffic.

The documentation of DNS Armor describes the service’s operation as follows: when enabling a DNS threat detector for a project, DNS Armor securely sends the internet-bound DNS query logs to a Google Cloud-based analysis engine powered by its partner, Infoblox. Their engine uses a combination of threat intelligence feeds and AI-based behavioral analysis to identify threats. Any malicious activity detected generates a DNS Armor threat log, which is then sent back to the users´ project and written to Cloud Logging for them to view and act upon.

(Source: Infoblox blog post)

Lastly, users can deploy DNS Armor as a managed service by Google, as it requires no virtual machines to oversee, and it does not impact the performance of Cloud DNS. Moreover, users can enable DNS Armor at the project level across virtual PCs, allowing them to have precise control over which cloud workloads need protection.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article BEYOND EXPO 2024 | UN Coordinator in China urges revitalization of multilateralism amid global conflicts · TechNode
Next Article The MacRumors Show: Leaks Reveal What Apple Products Are Coming Next
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Combat Dry Indoor Winter Air With a New Humidifier
Gadget
Meituan to bring delivery service KeeTa to Riyadh following its CEO’s take over of overseas business · TechNode
Computing
Samsung’s Galaxy Ring just exposed my biggest smart ring fear
News
Yes, Wayfair’s Holiday Deal Week is worth the hype — here are my 17 favorite finds up to 60% off
News

You Might also Like

News

Samsung’s Galaxy Ring just exposed my biggest smart ring fear

7 Min Read
News

Yes, Wayfair’s Holiday Deal Week is worth the hype — here are my 17 favorite finds up to 60% off

1 Min Read
News

These 5 Excel dashboard tricks would have saved me hours as a beginner

11 Min Read
News

Premier League Soccer: Stream Brentford vs. Man City Live From Anywhere

10 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?