A study by Palo Alto Networks on how DNS tunneling techniques are used in the wild shows that attackers are using the protocol to bypass security policies in enterprise networks and bypass circumvention and censorship circumventions.

Click here for the full alert.