Unlike hijacking, which alters resolution paths, cache poisoning exploits weaknesses in the DNS resolution process itself, enabling large-scale phishing, credential theft and malware distribution.
—
David Redekop,
Forbes.com,
9 Apr. 2025
This tactic exploits user trust in familiar sites, allowing attackers to silently breach systems of specific individuals or organizations.
Examples are automatically compiled from online sources to
show current usage.Read More
Opinions expressed in the examples do not represent those of Merriam-Webster or its editors.
Send us feedback.
Share