APNIC / FIRST Security 1 at APNIC 60
This post shares insights from the APNIC 60 joint session with FIRST about targeted espionage, SEO spam, and academic network vulnerabilities.
This post shares insights from the APNIC 60 joint session with FIRST about targeted espionage, SEO spam, and academic network vulnerabilities.
Guest Post: A new research tool helps map ASNs to their real operating organizations, reducing false positives in BGP hijack detection and improving operational visibility.
Guest Post: PeeringDB is running an anonymous user survey until the end of October 2025
The IPv6 deployment session at APNIC 60 covered new IPv6 scanning techniques, Vietnamese IPv6-only ambitions, how IPv6 enables IoT use cases, and more.
Geoff Huston discusses AusNOG 2025, and his measurement of ECN
Guest Post: How to create a thriving Internet Exchange Point that benefits all participants.
Guest Post: The technical community has identified the best ways to get started with RPKI. Some our most important RPKI experience is collected in this post.
Guest Post: IPID has a 25+ year history of abuse as a network side channel. This post categorizes IPID exploits, and makes a surprising recommendation about mitigating them.
Progress on APNIC’s resource delegation review program in Q3 2025 was reported during the APNIC Member Meeting at APNIC 60.
Network operations, BGP, post-quantum cryptography, and more from AusNOG 2025.