1. Palo Alto Networks. What Is DNS Tunneling? Retrieved from https://www.paloaltonetworks.com/cyberpedia/what-is-dns-tunneling. Palo Alto Networks. What Is DNS Tunneling? Retrieved from https://www.paloaltonetworks.com/cyberpedia/what-is-dns-tunneling.
2. Asaf Nadler and Avi Aminov. The Akamai Blog. Introduction to DNS Data Exfiltration. Retrieved from https://blogs.akamai.com/2017/09/introduction-to-dns-data-exfiltration.html Asaf Nadler and Avi Aminov. The Akamai Blog. Introduction to DNS Data Exfiltration. Retrieved from https://blogs.akamai.com/2017/09/introduction-to-dns-data-exfiltration.html
3. Plixer. 2015. Security Vendors Teaching Bad Actors How to Get Past Firewalls. Retrieved from https://www.plixer.com/blog/security-vendors-teaching-bad-actors-how-to-get-past-firewalls/ Plixer. 2015. Security Vendors Teaching Bad Actors How to Get Past Firewalls. Retrieved from https://www.plixer.com/blog/security-vendors-teaching-bad-actors-how-to-get-past-firewalls/
4. G DATA. 2014. New FrameworkPOS variant exfiltrates data via DNS requests. Retrieved from https://www.gdatasoftware.com/blog/2014/10/23942-new-frameworkpos-variant-exfiltrates-data-via-dns-requests G DATA. 2014. New FrameworkPOS variant exfiltrates data via DNS requests. Retrieved from https://www.gdatasoftware.com/blog/2014/10/23942-new-frameworkpos-variant-exfiltrates-data-via-dns-requests
5. Krebs on Security. 2015. Deconstructing the 2014 Sally Beauty Breach. Retrieved from https://krebsonsecurity.com/2015/05/deconstructing-the-2014-sally-beauty-breach/ Krebs on Security. 2015. Deconstructing the 2014 Sally Beauty Breach. Retrieved from https://krebsonsecurity.com/2015/05/deconstructing-the-2014-sally-beauty-breach/