Spoofing packets: What is it, and why do people do it?
Spoofed packets allow senders to hide their source address. How do they work and why do they do it?
Spoofed packets allow senders to hide their source address. How do they work and why do they do it?
Guest Post: How can we identify and locate IoT devices in networks to mitigate exposure to large-scale attacks?
Guest Post: Study investigates booter-based DDoS attacks in the wild and the impact of an FBI takedown.
Beating IoT botnets means spotting them first — graph theory research can help.
Guest Post: Study analyzes the efficiency of RTBH as a mitigation tool at one of the world’s largest IXPs.
Last year’s DDoS attacks on Cambodia’s ISPs have been a wake up call to the industry.
Guest Post: Steinthor Bjarnason concludes a three-part series on DDoS attacks, focusing on blocking well-known attack vectors and using realtime monitoring.
Guest Post: Steinthor Bjarnason details SSDP and memcached DDoS attacks and how to mitigate them.
Guest Post: Steinthor Bjarnason discusses recent DDoS trends, and details carpet bombing attacks and how to mitigate them.
Here are a few moments I’ve captured from the first two days of the RIPE 77 meeting happening this week.