<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:blog="http://dnn-connect.org/blog/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Blog</title>
    <link>http://dnndefender.com/Blogs/locale/en-US/Blog</link>
    <description />
    <pubDate>Thu, 30 Apr 2026 08:30:25 GMT</pubDate>
    <lastBuildDate>Thu, 30 Apr 2026 08:30:25 GMT</lastBuildDate>
    <generator>DotNetNuke Blog RSS Generator Version 0.0.1.0</generator>
    <ttl>30</ttl>
    <atom:link href="http://dnndefender.com/DesktopModules/Blog/API/RSS/Get?moduleid=404&amp;tabid=39" rel="self" type="application/rss+xml" />
    <item>
      <title>Modern Webshells 2024–2026: Minimal C# Loader Techniques with Encrypted Payloads from C2 and How They Bypass Detection</title>
      <link>http://dnndefender.com/Blogs/Post/186/Modern-Webshells-2024-2026-Minimal-C-Loader-Techniques-with-Encrypted-Payloads-from-C2-and-How-They-Bypass-Detection</link>
      <description>&lt;p&gt;Posted on: February 13, 2026 | Author: Hung&lt;/p&gt;

&lt;p&gt;Today, we will examine one of the detection capabilities that the DNNDefender module is designed to provide&amp;mdash;specifically, the types of stealth techniques that are often overlooked by traditional antivirus engines or hosting-level firewalls. While AV solutions typically rely on signatures and generic heuristics, and hosting firewalls focus on network-layer filtering, modern loader-based implants often operate within legitimate IIS and .NET execution flows, making them far harder to identify.&lt;/p&gt;
</description>
      <guid isPermaLink="true">http://dnndefender.com/Blogs/Post/186/Modern-Webshells-2024-2026-Minimal-C-Loader-Techniques-with-Encrypted-Payloads-from-C2-and-How-They-Bypass-Detection</guid>
      <pubDate>Fri, 13 Feb 2026 03:19:00 GMT</pubDate>
      <blog:publishedon>2026-02-13 03:19:00Z</blog:publishedon>
    </item>
    <item>
      <title>Why Bots Target Forms, including DNN ones</title>
      <link>http://dnndefender.com/Blogs/Post/185/Why-Bots-Target-Forms-including-DNN-ones</link>
      <description>&lt;p dir="auto"&gt;Automated bots frequently target DNN contact and registration forms with malicious intent. Common goals include:&lt;/p&gt;

&lt;ol dir="auto"&gt;
 &lt;li&gt;&lt;strong&gt;SEO Backlink Spam&lt;/strong&gt; &amp;mdash; Submitting links to scam/gambling/fake sites to create unwanted backlinks from your site.&lt;/li&gt;
 &lt;li&gt;&lt;strong&gt;Spam Relay Abuse&lt;/strong&gt; &amp;mdash; Using &amp;ldquo;send me a copy&amp;rdquo; features to turn your server into a spam sender, risking domain/IP blacklisting.&lt;/li&gt;
 &lt;li&gt;&lt;strong&gt;Vulnerability Exploitation&lt;/strong&gt; &amp;mdash; Probing forms for SQL Injection, XSS, or other attacks (e.g., deserialization, password reset abuse) that can lead to full compromise.&lt;/li&gt;
 &lt;li&gt;&lt;strong&gt;Mass Fake Account Creation&lt;/strong&gt; &amp;mdash; Flooding registration forms to build fake accounts for future spam or abuse.&lt;/li&gt;
 &lt;li&gt;&lt;strong&gt;Resource Abuse (Application-Level DDoS)&lt;/strong&gt; &amp;mdash; Repeated submissions overload database, email queues, and server resources, slowing/crash the site and raising costs.&lt;/li&gt;
&lt;/ol&gt;
</description>
      <guid isPermaLink="true">http://dnndefender.com/Blogs/Post/185/Why-Bots-Target-Forms-including-DNN-ones</guid>
      <pubDate>Fri, 13 Feb 2026 01:48:00 GMT</pubDate>
      <blog:publishedon>2026-02-13 01:48:00Z</blog:publishedon>
    </item>
  </channel>
</rss>