Stop spoofed traffic at the door: Destination-side SAV
Guest Post: Roughly half of all ASes fail to filter for spoofed traffic as it enters their network border. A new tool helps admins test their own network in real time.
Guest Post: Roughly half of all ASes fail to filter for spoofed traffic as it enters their network border. A new tool helps admins test their own network in real time.
There are plenty of alternatives for RPKI validation.
Guest Post: An investigation into an HTTPS interception attack using a custom root CA.
Adli Wahid attended IBCAST 2021 where he delivered a presentation on the APNIC Community Honeynet project.
Opinion: The NSA recently issued some advice on DoH. It wasn’t necessarily bad advice, but it was not well received.
The recent RIPE NCC Open House discussion on RPKI highlighted global progress and challenges still to solve.
Guest post: Where does DNS spoofing occur? How often? Is it increasing? Researchers examined six years of data to find out.
Guest Post: Mongolia is the second economy in the world to achieve 100% Route Origin Validation (ROV) coverage.
Guest Post: Most WiFi devices are designed to acknowledge all packets received — this poses security risks.
Adli Wahid discussed the role of CSIRTs and ISACS in cyber-resilience at a recent CSIRT.ID virtual seminar.