<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DGA vs DNS Tunneling no Check Point (ThreatCloud AI) in Brazil</title>
    <link>https://community.checkpoint.com/t5/Brazil/DGA-vs-DNS-Tunneling-no-Check-Point-ThreatCloud-AI/m-p/275450#M55</link>
    <description>&lt;P&gt;Excelente artigo, Willi!&lt;/P&gt;</description>
    <pubDate>Tue, 14 Apr 2026 21:47:01 GMT</pubDate>
    <dc:creator>PedroOliveira</dc:creator>
    <dc:date>2026-04-14T21:47:01Z</dc:date>
    <item>
      <title>DGA vs DNS Tunneling no Check Point (ThreatCloud AI)</title>
      <link>https://community.checkpoint.com/t5/Brazil/DGA-vs-DNS-Tunneling-no-Check-Point-ThreatCloud-AI/m-p/275383#M54</link>
      <description>&lt;H2&gt;Como fechar o caso com evidência (TAC-grade)&amp;nbsp; sem cair em troubleshooting “no escuro”&lt;/H2&gt;
&lt;H3&gt;Por que esse post existe (dor real)&lt;/H3&gt;
&lt;P&gt;Se você já passou por um desses cenários, sabe como isso vira “tempo queimado” rápido:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;“Domínios aleatórios”&lt;/STRONG&gt; aparecendo em logs (parece DGA, mas ninguém consegue provar).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Suspeita de &lt;STRONG&gt;DNS tunneling&lt;/STRONG&gt;, mas a análise vira opinião porque falta baseline e evidência.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;A equipe cria &lt;STRONG&gt;exceção global&lt;/STRONG&gt; “pra resolver rápido” e isso vira &lt;STRONG&gt;buraco permanente&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Alguém confunde &lt;STRONG&gt;ThreatCloud (inteligência)&lt;/STRONG&gt; com &lt;STRONG&gt;enforcement&lt;/STRONG&gt;, e o troubleshooting vai para o lado errado.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Este guia é um modelo &lt;STRONG&gt;TAC-grade&lt;/STRONG&gt; para explicar, provar e operar &lt;STRONG&gt;DGA&lt;/STRONG&gt; e &lt;STRONG&gt;DNS tunneling&lt;/STRONG&gt; com rigor.&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;0) Modelo mental (o erro #1 que quebra troubleshooting)&lt;/H2&gt;
&lt;H3&gt;Control plane: ThreatCloud AI (inteligência/veredito)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;ThreatCloud AI fornece &lt;STRONG&gt;reputação + contexto + veredito&lt;/STRONG&gt; (ex.: suspeito/malicioso, categoria).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Ele &lt;STRONG&gt;não aplica bloqueio sozinho&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Data plane: Enforcement point (gateway/endpoint/cloud)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;O bloqueio/detecção acontece no &lt;STRONG&gt;enforcement point&lt;/STRONG&gt;, controlado por:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;blades habilitadas&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;policy e escopo&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;visibilidade do DNS (path real do DNS)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; &lt;STRONG&gt;Regra TAC:&lt;/STRONG&gt; caso fechado = &lt;STRONG&gt;timestamp + entidade (host/user) + FQDN + veredito/categoria + ação aplicada&lt;/STRONG&gt; no enforcement point.&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;1) Fast triage em 10 minutos (sem achismo)&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Fixe o timestamp&lt;/STRONG&gt; do evento/teste (exato).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Identifique &lt;STRONG&gt;host/user/IP&lt;/STRONG&gt; de origem.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Extraia o &lt;STRONG&gt;FQDN&lt;/STRONG&gt; e observe o padrão:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;muitos domínios “randomizados”/únicos → tende a DGA&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;poucos domínios base, subdomínios longos e variáveis → tende a tunneling&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Confirme no log do enforcement point:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;categoria/veredito&lt;/STRONG&gt; (DGA/DNS tunneling/suspicious DNS)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;ação&lt;/STRONG&gt; (Prevent/Detect/Bypass/Allow)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Classifique rapidamente:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;1 host&lt;/STRONG&gt; com padrão forte → maior chance de comprometimento&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;muitos hosts&lt;/STRONG&gt; no mesmo “domínio estranho” → valide CDN/telemetria/SaaS antes de escalar&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;2) Tabela TAC — Sintoma → Causa provável → Como provar&lt;/H2&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Sintoma no campo&lt;/TH&gt;
&lt;TH&gt;Causa provável&lt;/TH&gt;
&lt;TH&gt;Como provar (evidência mínima)&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Muitos domínios “randômicos”, first-seen&lt;/TD&gt;
&lt;TD&gt;DGA/C2 resiliente&lt;/TD&gt;
&lt;TD&gt;Log com &lt;STRONG&gt;FQDNs múltiplos&lt;/STRONG&gt; + &lt;STRONG&gt;timestamp&lt;/STRONG&gt; + &lt;STRONG&gt;ação&lt;/STRONG&gt; (Detect/Prevent) + &lt;STRONG&gt;origem&lt;/STRONG&gt; (host/user)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Subdomínios muito longos/alta entropia&lt;/TD&gt;
&lt;TD&gt;DNS tunneling (payload)&lt;/TD&gt;
&lt;TD&gt;Padrão em log/PCAP: &lt;STRONG&gt;labels longos&lt;/STRONG&gt; + &lt;STRONG&gt;cadência alta&lt;/STRONG&gt; + &lt;STRONG&gt;mesmo domínio base&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;“Suspeito”, mas não bloqueia&lt;/TD&gt;
&lt;TD&gt;Sem enforcement / scope errado / DNS fora do gateway&lt;/TD&gt;
&lt;TD&gt;Log mostra &lt;STRONG&gt;Allow/Bypass&lt;/STRONG&gt; ou ausência de evento no enforcement point&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;“Bloqueou”, mas parece falso positivo&lt;/TD&gt;
&lt;TD&gt;Domínio legítimo (CDN/telemetria/SaaS) parecido com DGA&lt;/TD&gt;
&lt;TD&gt;Evidência de &lt;STRONG&gt;múltiplos hosts&lt;/STRONG&gt; acessando o mesmo domínio + validação de legitimidade&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Ambiente com ruído e exceções crescendo&lt;/TD&gt;
&lt;TD&gt;Governança fraca&lt;/TD&gt;
&lt;TD&gt;Exceções sem owner/expiry e sem evidence pack anexado&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Resultado inconsistente por rede/usuário&lt;/TD&gt;
&lt;TD&gt;DNS path diferente (resolver local, DoH/DoT, split)&lt;/TD&gt;
&lt;TD&gt;Host A loga no gateway; Host B sai direto / DoH — comportamento diverge&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;3) DGA (Domain Generation Algorithm) — o que você precisa saber para operar&lt;/H2&gt;
&lt;H3&gt;O que é (no nível certo)&lt;/H3&gt;
&lt;P&gt;DGA é geração automática de domínios por malware para manter &lt;STRONG&gt;C2&lt;/STRONG&gt; mesmo com bloqueios. A característica operacional é &lt;STRONG&gt;alta rotatividade&lt;/STRONG&gt; de domínios “newly seen”.&lt;/P&gt;
&lt;H3&gt;O que sustenta a detecção (defensável e observável)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Features lexicais/estatísticas&lt;/STRONG&gt; (entropia, comprimento de labels, distribuição de caracteres)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Churn&lt;/STRONG&gt;: muitos FQDNs únicos em curto intervalo&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Contexto&lt;/STRONG&gt;: first-seen/newly observed + correlações (quando disponíveis)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; &lt;STRONG&gt;Prova TAC mínima para fechar DGA&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;timestamp do teste&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;host/user&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;lista de FQDNs (amostra + contagem em janela curta)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;categoria/veredito&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;ação aplicada&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;4) DNS Tunneling — o que realmente fecha o caso&lt;/H2&gt;
&lt;H3&gt;O que é (no nível certo)&lt;/H3&gt;
&lt;P&gt;DNS tunneling = abuso de DNS para &lt;STRONG&gt;exfiltração&lt;/STRONG&gt; e/ou &lt;STRONG&gt;C2&lt;/STRONG&gt;. A chave é &lt;STRONG&gt;padrão comportamental&lt;/STRONG&gt;, não um IOC único.&lt;/P&gt;
&lt;H3&gt;Sinais técnicos que valem investigação&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;subdomínios longos e pouco “humanos” (payload-like)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;alta frequência com cadência regular (beaconing)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;domínio base repetido com label variando&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;baseline por host “quebrado” (um endpoint muda o perfil DNS)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; &lt;STRONG&gt;Prova TAC mínima&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;timestamp&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;host/user&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;FQDN + padrão (ex.: 10 exemplos com labels longos)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;taxa/volume (quando disponível)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;categoria/veredito&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;ação aplicada&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;(ideal) PCAP/log do resolver para evidenciar o padrão&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;5) Onde buscar evidência (sem depender de memória)&lt;/H2&gt;
&lt;H3&gt;Enforcement (fonte de verdade)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;SmartLog / SmartEvent / pipeline SIEM&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Query lógica (adapte à sua sintaxe):&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;CODE&gt;(Action: Prevent OR Detect) AND (Category: "DNS Tunneling" OR "DGA") AND (src:&amp;lt;IP&amp;gt; OR user:&amp;lt;user&amp;gt;) AND (time:&amp;lt;window&amp;gt;)&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Correlação&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;sempre por &lt;STRONG&gt;timestamp&lt;/STRONG&gt; e &lt;STRONG&gt;entidade&lt;/STRONG&gt; (host/user)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;checar &lt;STRONG&gt;recorrência&lt;/STRONG&gt;: 5–15 min em torno do evento&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Rede (quando precisar “prova definitiva”)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;logs do resolver corporativo ou PCAP para:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;cadência&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;estrutura dos subdomínios&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;volume&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;6) Evidence Pack (copiar/colar) — padrão CheckMates/TAC&lt;/H2&gt;
&lt;P&gt;Cole isso quando abrir tópico/caso:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Versão/Take do gateway&lt;/STRONG&gt;:&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Blades relevantes habilitadas&lt;/STRONG&gt;:&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Timestamp exato do teste&lt;/STRONG&gt;:&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Host / User / IP origem&lt;/STRONG&gt;:&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;FQDN(s)&lt;/STRONG&gt; (amostra):&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Categoria/Veredito&lt;/STRONG&gt;:&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Ação aplicada (Prevent/Detect/Bypass/Allow)&lt;/STRONG&gt;:&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Policy/Rule/Blade&lt;/STRONG&gt; (se log expõe):&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Recorrência (quantos eventos em X min)&lt;/STRONG&gt;:&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Rede&lt;/STRONG&gt;: DNS via gateway? resolver local? DoH/DoT?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Anexo&lt;/STRONG&gt;: screenshot/exports do log no intervalo do teste&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;7) Governança de exceções (onde a maioria dos ambientes “perde maturidade”)&lt;/H2&gt;
&lt;P&gt;Exceção sem controle vira &lt;STRONG&gt;dívida de risco&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Toda exceção deve ter:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;escopo (grupo/host — &lt;STRONG&gt;não global por padrão&lt;/STRONG&gt;)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;justificativa&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;owner&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;review/expiry date&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;evidence pack anexado&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Referências oficiais (Check Point)&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;sk175623&lt;/STRONG&gt; — ThreatCloud DGA protection&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;sk178487&lt;/STRONG&gt; — ThreatCloud DNS Tunneling Protection&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;sk176865&lt;/STRONG&gt; — Check Point response to Log4j RCE&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Pergunta para a comunidade (para gerar discussão útil)&lt;/H2&gt;
&lt;P&gt;Na experiência de vocês, o que mais dói hoje?&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Falsos positivos&lt;/STRONG&gt; em “domínios estranhos” (DGA vs CDN/telemetria), ou&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Suspeita de DNS tunneling&lt;/STRONG&gt; sem baseline/evidência suficiente para fechar o caso?&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 14 Apr 2026 02:23:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Brazil/DGA-vs-DNS-Tunneling-no-Check-Point-ThreatCloud-AI/m-p/275383#M54</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-04-14T02:23:43Z</dc:date>
    </item>
    <item>
      <title>Re: DGA vs DNS Tunneling no Check Point (ThreatCloud AI)</title>
      <link>https://community.checkpoint.com/t5/Brazil/DGA-vs-DNS-Tunneling-no-Check-Point-ThreatCloud-AI/m-p/275450#M55</link>
      <description>&lt;P&gt;Excelente artigo, Willi!&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 21:47:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Brazil/DGA-vs-DNS-Tunneling-no-Check-Point-ThreatCloud-AI/m-p/275450#M55</guid>
      <dc:creator>PedroOliveira</dc:creator>
      <dc:date>2026-04-14T21:47:01Z</dc:date>
    </item>
  </channel>
</rss>

