Dangling Danger: Why You Need to Focus on Your DNS Posture Management

Tony Lauro

Written by

Tony Lauro

June 30, 2025

Tony Lauro

Written by

Tony Lauro

Tony Lauro is Senior Director of Technology and Security Strategy at Akamai. Tony has worked with Akamai's top global clients to provide cybersecurity guidance, architectural analysis, web application, and network security expertise. With more than 25 years of information security operations experience, Tony has worked and consulted in many verticals, including finance, automotive, medical/healthcare, enterprise, and mobile applications.

Given the potential risk, paying more attention to your DNS security posture should be a priority.
Given the potential risk, paying more attention to your DNS security posture should be a priority.

Imagine this scenario: You deprovision a web resource that was created for a product or promotion that no longer exists. You believe that you’ve removed all traces from public access … but have you? 

The Domain Name System (DNS) record — the CNAME — may still be out there. If so, an attacker may find this “dangling” CNAME in public DNS records and hijack the subdomain. Now they can create a well-laid trap for redirecting traffic to an impersonated site that they can use for phishing or other malicious schemes.

Small error, big problem

Seems far-fetched? It’s not. DNS vulnerabilities are more common than you might think. 

For example, a major financial services company discovered in early 2025 that a DNS server name had a small typo — “.ne” instead of “.net”. This could have allowed a malicious actor to register the erroneous name and divert traffic intended for the company. Fortunately, the error was discovered in time to secure the domain, which, due to the typo, was administered by the top-level domain authority for the African country of Niger.

In a more nefarious example from January 2025, researchers discovered a massive, 13,000-device botnet exploiting DNS flaws that enabled it to spoof 20,000 domains. These were then used to send out emails from domains that appeared legitimate to deliver malware.

While examples like these grab headlines, perhaps the most common scenario is simply neglecting to remove CNAME records from your DNS zone.

The overlooked risk of DNS records

The ubiquity of DNS records is key to understanding the threat. The Domain Name System is a fundamental component of the internet, directing traffic to its intended location. It’s not unusual for organizations to have thousands of DNS records associated with their domains and subdomains. 

When these records are not maintained properly or are misconfigured, they can end up pointing to a resource that no longer exists. That can open the door for a malicious actor to claim it.

Adding to the risk is the fact that DNS records are public. Anyone can use a DNS lookup tool to view all DNS records, including the CNAME, for a particular domain name. It doesn’t require sophisticated tools or techniques to identify a dangling CNAME — and a potential opening to seize the traffic to it.

Improving your DNS security posture

Given the potential risk, paying more attention to your DNS security posture should be a priority. That starts with gaining greater visibility over your entire DNS infrastructure.

Easier said than done. That’s because evolving network architectures and hybrid cloud and multicloud deployments often involve multiple disparate DNS systems and teams that increase complexity. Shadow IT, cloud migrations, and acquisitions compound the challenge, creating undocumented DNS zones and records, reducing visibility, and expanding the attack surface.

Attempting to keep track of this DNS environment using manual methods is extremely time-consuming, impractical, and prone to error. Failing to enforce consistent security policies leaves critical infrastructure vulnerable to DNS-based attacks. It also creates compliance risks and increases the time required to detect and remediate attacks.

Effective DNS posture management requires automated DNS monitoring with end-to-end visibility. This provides a critical, comprehensive view that reveals misconfigurations, risks of exposure, and hygiene issues across your entire DNS infrastructure. So you can spot and correct any vulnerabilities before the malicious actors do.

What about third-party services?

DNS posture management is the starting point for understanding how your digital presence appears to the outside world. Once you secure your own environment, the next logical step is to secure how others, especially software as a service (SaaS) providers, interact with you.

SaaS security posture management extends that visibility and control to the third-party services and applications that your workforce relies on every day. It’s about ensuring that those you trust to work for you — from cloud-based CRMs to collaboration platforms — are configured securely, monitored continuously, and aligned with your enterprise policies.

Together, DNS posture management and SaaS security posture management form a cohesive strategy: First, secure yourself; second, secure your extended ecosystem.

How Akamai can help

Akamai offers practical solutions for improving your security posture. Akamai DNS Posture Management provides end-to-end visibility, automation, and risk mitigation for your DNS infrastructure. It provides a single interface that consolidates DNS zones, domains, subdomains, and records from all DNS providers — including SaaS providers.

This centralized approach simplifies DNS security management in today’s multivendor environments. So you can monitor, secure, and optimize your DNS infrastructure with speed and simplicity — and leave no DNS dangling.



Tony Lauro

Written by

Tony Lauro

June 30, 2025

Tony Lauro

Written by

Tony Lauro

Tony Lauro is Senior Director of Technology and Security Strategy at Akamai. Tony has worked with Akamai's top global clients to provide cybersecurity guidance, architectural analysis, web application, and network security expertise. With more than 25 years of information security operations experience, Tony has worked and consulted in many verticals, including finance, automotive, medical/healthcare, enterprise, and mobile applications.