Whac-A-Mole: Six years of DNS spoofing
Guest post: Where does DNS spoofing occur? How often? Is it increasing? Researchers examined six years of data to find out.
Guest post: Where does DNS spoofing occur? How often? Is it increasing? Researchers examined six years of data to find out.
Guest Post: Most WiFi devices are designed to acknowledge all packets received — this poses security risks.
Adli Wahid discussed the role of CSIRTs and ISACS in cyber-resilience at a recent CSIRT.ID virtual seminar.
APNIC’s Adli Wahid presented on CERT cooperation and engagement at the CNCERT International Partnership in Emergency Response Conference.
Guest post: A new tool that uses DNS cache snooping on public DNS resolvers to measure the prevalence of rare applications and domains on the Internet.
2020 was a challenging year for cybersecurity professionals, with a transformed threat landscape.
APNIC presented on securing Internet routing at BSides Brisbane in Brisbane, Australia on 12 December 2020.
Guest Post: If you’re a member of more than one RIR and manage IP address space and routes across them, delegated RPKI will allow you to use manage ROAs seamlessly and transparently.
Guest Post: Network operators are largely in the dark about the effectiveness of blocklists.
Guest Post: More than 90% of all Open Platform Communications Unified Architecture deployments reachable from the Internet neglect security benefits