A tale of two honeypots in Bhutan
Honeypots can be useful tools for security research, teaching us about attackers’ methods.
Honeypots can be useful tools for security research, teaching us about attackers’ methods.
Guest Post: The University of the South Pacific manages a number of challenges in operating, maintaining and upgrading its large and diverse network.
APNIC supported and actively participated at SANOG 34 in Kolkata, India, from 31 July to 7 August 2019.
Guest Post: A team of researchers measured the effects of DNS Flag Day from the perspective of end entities and authoritative servers.
Guest Post: Why do recursive resolvers select certain authoritative nameservers? Can it be improved?
Guest Post: Using more than one route collection tool provides a more accurate view of network performance.
Guest Post: MalConfScan is a new malware analysis and memory forensics tool developed by JPCERT/CC to assist with incident investigations.
Guest Post: How prevalent are DoT and DoH projects, and what languages are developers using to implement them?
QNAME Minimisation has been billed as an efficient means to protect your privacy in the DNS. But are you using it?
TechCERT’s Dileepa Lathsara says cybersecurity is now a board-level discussion in Sri Lanka.