Stopping DNS-based DDoS attacks in their tracks
Guest Post: Researchers propose a mechanism for DNS servers to independently determine a client’s preferred protocol.
Guest Post: Researchers propose a mechanism for DNS servers to independently determine a client’s preferred protocol.
Guest Post: Learn how Source Address Validation helps mitigate source address spoofing and what the IETF is doing to make it better.
Guest Post: Reviewing and patching for past vulnerabilities can help to plan for and mitigate future attacks.
Guest Post: Understanding malware threats towards the DNS is the first step towards mitigating them.
This round of ISIF Asia grantees is the biggest ever, with 22 projects covering 18 economies. Projects range from BGP and cybersecurity through to Internet development.
Guest Post: High-speed programmable switches are promising but share common design pitfalls that are potentially exploitable.
Guest Post: Study identifies more than 1 million hidden root certificates operated by 5,000 organizations, including government/enterprise agencies and TLS-interception software.
Guest Post: An overlooked DNS vulnerability that, when combined with a configuration error, is leading to massive DNS traffic surges.
APNIC presented and delivered training at the Bhutan Cybersecurity Week 2021, held online from 20 to 25 December 2021.
Guest Post: It’s time to upgrade HTTPS to better handle privacy concerns.