How to analyse a cyber attack chain: A cyber drill scenario from BGD e-GOV CIRT
Guest Post: BGD e-GOV CIRT takes us through the steps of a recent Exchange cyber drill run for local financial institutions in Bangladesh.
Guest Post: BGD e-GOV CIRT takes us through the steps of a recent Exchange cyber drill run for local financial institutions in Bangladesh.
‘How to’ posts are a great way to learn how to use a new tool, troubleshoot problems, or perform advanced tasks. Here are three of 2021’s best.
Here are APNIC Blog’s top three posts related to security for 2021.
Guest Post: Emerging IoT threats are quickly evolving and adapting to current defences.
Guest Post: Is it possible to disrupt RPKI Relying Party software by introducing a malicious CA/repository into the tree?
Slack’s DNSSEC debacle, NSEC problems, Measuring DNSSEC, and more from DNS-OARC 36.
Guest Post: How resilient are LEO satellite networks to DDoS attacks?
Guest Post: Encryption forced NPM vendors to evolve. Part 2 of this series discusses NPM’s evolution, including synthetic testing as one recent advancement.
Geoff Huston discusses technical presentations from RIPE 83.
Guest Post: Researchers show how SAD DNS attacks allow an off-path attacker to inject malicious DNS records into a DNS cache.