Hacksplaining
  • For Teams
Log in Start Learning

DNS Poisoning

More serious threats target the root servers and ISPs. In 2019, a hacker group known as Sea Turtle compromised a Swedish Internet service provider and the Domain Name System for the Saudi Arabian top-level domain .sa. This was a sophisticated hacking operation that pointed to state-sponsored actors, though nobody was able to pinpoint their motives. (Maybe they had a grudge against countries beginning with the letter S?)

Description
Hacksplaining

Defend your code.

Learn

All Lessons AI Prompt Injection SQL Injection XSS CSRF

Teams

For Teams Features Pricing FAQ

Resources

Glossary OWASP Top 10 PCI Compliance Book

Legal

Privacy Terms DPA Subprocessors

© 2026 Hacksplaining. Built with in Seattle, WA, USA

Need help? Reach out to support@hacksplaining.com