Michael BestMan Osemudiamen
Posted: September 17, 2025 • 1 min read

For cybersecurity professionals, the basics upon which an application is secured cannot be overridden. The growing concern for security has given rise to evolving security mechanisms. While this piece attempts to examine some of the vulnerabilities that occur at the internet layer like DNS Spoofing and Cache Poisoning, it will highlight how modern security protocols like DNS Security Extensions (DNSSEC) and DNS over HTTPS (DoH) changes the narrative.
Translating human-readable domain names like “reinventsecurity.org” into IP address (108.157.78.33) is a great feat within the confines of the internet's evolution. This process is called the DNS Resolution
However, if care is not taken, the DNS is one of the areas attackers look to exploit, redirecting for instance users to malicious, phishing sites. Some of these attacks include:
By barely paying attention to these vulnerabilities and taking security for granted, the impact on users and organisations can be quite devastating. It could lead to the following consequences:
With efforts to contain the security risks involve with DNS attacks, the following strategic mechanism evolved: DNS Security Extension (DNSSEC)and DNS over HTTPS (DoH).
If your goal is to secure applications, then understanding these woven intricacies and attacks proves handy. Application security is as strong as the network it runs on. Understanding, for instance, that DNS is a critical part of the modern internet infrastructure, and building knowledge on these common vulnerabilities, can help professionals priortise the implementation of security measures or strategies like DNS over HTTPS (DoH) and DNS Security Extension (DNSSEC). From here, diving into application security requires solidifying these core concepts, by building applications protected from a wide range of threats like SQL injection, Cross-site scripting (XSS) and so on.
In the end, cybersecurity matters. Organisations, professionals, and users must see it as an ongoing effort to protect network systems, applications, and data from the excruciating rise in cyberattacks year in and year out.
https://www.reinventsecurity.org/blog/Address-DNS
https://www.reinventsecurity.org/blog/Url-Page
https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet