UDP-based amplification — the dangerous DDoS attack vector
Guest Post: Learn how to save time and money by protecting against UDP flood DoS attacks.
Guest Post: Learn how to save time and money by protecting against UDP flood DoS attacks.
Guest Post: Around 20% of resolvers almost never succeed in resolving AAAA queries.
Guest Post: TLS 1.3 is an example of how Internet technology is developed and refined by a small number of players.
Large-scale IPv6 scanning is feasible. Secure and monitor IPv6 and open IPv6 services on your network with Shadowserver’s free reports.
Guest Post: How should automated systems in network and security management work?
Guest Post: Segment routing can help implement the service capabilities required by network slicing in the transport domain.
Guest Post: Recently approved HTTPS and SVCB record types aim to change a long-standing paradigm.
Guest Post: Unless we recognize the necessity of working with others to improve the entire digital environment, it won’t be long before that environment becomes intolerable for all of us.
ROV measurement, DANE Portal, IPv6 extension headers, congestion control, and more topics of interest from IETF 114.
Guest Post: Effective threat hunting, incident response in the cloud, how to stop phishing, and the emotional experience of ransomware.