APNIC / FIRST Security 1 at APNIC 60
This post shares insights from the APNIC 60 joint session with FIRST about targeted espionage, SEO spam, and academic network vulnerabilities.
This post shares insights from the APNIC 60 joint session with FIRST about targeted espionage, SEO spam, and academic network vulnerabilities.
Guest Post: A new research tool helps map ASNs to their real operating organizations, reducing false positives in BGP hijack detection and improving operational visibility.
The IPv6 deployment session at APNIC 60 covered new IPv6 scanning techniques, Vietnamese IPv6-only ambitions, how IPv6 enables IoT use cases, and more.
Geoff Huston discusses AusNOG 2025, and his measurement of ECN
Guest Post: How to create a thriving Internet Exchange Point that benefits all participants.
Guest Post: The technical community has identified the best ways to get started with RPKI. Some our most important RPKI experience is collected in this post.
Guest Post: IPID has a 25+ year history of abuse as a network side channel. This post categorizes IPID exploits, and makes a surprising recommendation about mitigating them.
Network operations, BGP, post-quantum cryptography, and more from AusNOG 2025.
The Open Source Technologies session at APNIC 60 explored four use cases for open source tech in network operations.
Where does Explicit Congestion Notification (ECN) fit into TCP congestion control on the public Internet? The data shows it in very specific places, like the networks of AI data centres.