Guest Post: Cybercriminals now see home routers as gateways to corporate networks, and companies as potential attack vectors.
Guest Post: More popular websites are more likely to make changes to their name server records following a DDoS attack on their cloud provider.
Guest Post: New routing method uses bandwidth reservations, improving speed and security to meet service-level objectives.
Guest Post: Researchers propose a mechanism for DNS servers to independently determine a client’s preferred protocol.
Guest Post: An overlooked DNS vulnerability that, when combined with a configuration error, is leading to massive DNS traffic surges.
APNIC staff presented on IPv6, and DDoS prevention at KHNOG 3, held online on 4 December 2021.
Guest Post: How resilient are LEO satellite networks to DDoS attacks?
Guest Post: Simulating a DDoS attack, Japanese researchers tested a full-service resolver configured with both fetch-limit and serve-stale enabled.
Guest Post: Researchers show how middleboxes and censorship infrastructure can be abused to launch reflected DoS amplification attacks over TCP.
Geoff shares his thoughts on what was being discussed the recent OARConline 35a.