Using honeybuckets to characterize cloud storage scanning in the wild
Guest Post: Researchers investigate the methods and frequency with which attackers target poorly secured cloud storage buckets.
Guest Post: Researchers investigate the methods and frequency with which attackers target poorly secured cloud storage buckets.
Guest Post: Profiling serial hijackers with less data than previous efforts while achieving similar accuracy.
Geoff Huston discusses measuring the routability of 240.0.0.0/4 class-E addresses.
Measuring GenAI usage patterns, dynamic fixed-point values in eBPF, improving TCP/IP performance and more from AINTEC 2024.
Nowmay Opalinski discusses the GEODE project and his analysis of Internet fragility in Pakistan.
Guest Post: Lessons learned from a study on the interrelation of CAA, CT, and DANE in web PKI deployments.
Guest Post: The ‘Olympeaks Observatory’ tracked record-breaking peaks in Internet traffic during the 2024 Olympics.
Guest Post: A longitudinal analysis of phishing attacks observed at three ccTLDs registries that manage more than 8M active domains.
Geoff discusses EDNS0 client subnet signaling, how it affects traffic steering by the CDN, and the labs measurements.
Guest Post: First-of-its-kind study compares IPv6 off-net deployment and latency to IPv4 across 14 hypergiants.