Tuesday, July 16, 2024

Quad9 – Free DNS Platform to Protect Users From Malware and Phishing Sites

Quad9 a free DNS security solution that uses to protect users against most common cyber threats and their privacy.

It keeps blocking you against known malicious domains and prevents your computer and IoT devices from connecting to malware or phishing sites.

Quad9 created in collaboration with IBM Security, Packet Clearing House and the Global Cyber Alliance (GCA), intend to provide users an added privacy and security protection as they across the internet.

Threat intelligence

It checks the website with IBM X-Force threat intelligence database which consists of 40 Million analyzed web pages and images. Also, it feeds on 18 additional threat intelligence sources.

Also Read: Email Header Analysis – Received Email is Genuine or Spoofed

All of these sources combined into threat mitigation feed gives a vast database to Quad9, which makes it to act rapidly in case of risks emerge.

How Does it work

To use Quad9 DNS service change your computer preferred DNS server to, then your request will be routed through Quad9 DNS instead of your ISP default DNS.

It has an inbuilt threat intelligence if it detects malware or other infection in the domains you enter it blocks from accessing it.

Quad9 says IP addresses of end users are not stored to disk or distributed outside of the equipment answering the query in the local data center. Quad9 is a nonprofit organization dedicated only to the operation of DNS services. There are no other secondary revenue streams for personally-identifiable data, and the core charter of the organization is to provide secure, fast, private DNS.


Servers distributed worldwide and they are placed primary at Internet exchange points, so it reduces the time and distance better than any other solutions.

At launch severs they placed servers at 70 locations, more than 160 locations scheduled on 2018 and the systems are anycast which automatically routes to the closest operational system.

To Setup on Windows

To Setup on Mac


Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles