Whac-A-Mole: Six years of DNS spoofing
Guest post: Where does DNS spoofing occur? How often? Is it increasing? Researchers examined six years of data to find out.
Guest post: Where does DNS spoofing occur? How often? Is it increasing? Researchers examined six years of data to find out.
Guest Post: Mongolia is the second economy in the world to achieve 100% Route Origin Validation (ROV) coverage.
Guest Post: Most WiFi devices are designed to acknowledge all packets received — this poses security risks.
Adli Wahid discussed the role of CSIRTs and ISACS in cyber-resilience at a recent CSIRT.ID virtual seminar.
APNIC’s Adli Wahid presented on CERT cooperation and engagement at the CNCERT International Partnership in Emergency Response Conference.
Guest post: A new tool that uses DNS cache snooping on public DNS resolvers to measure the prevalence of rare applications and domains on the Internet.
2020 was a challenging year for cybersecurity professionals, with a transformed threat landscape.
APNIC presented on securing Internet routing at BSides Brisbane in Brisbane, Australia on 12 December 2020.
Guest Post: If you’re a member of more than one RIR and manage IP address space and routes across them, delegated RPKI will allow you to use manage ROAs seamlessly and transparently.
APNIC participated in the ITU CyberDrill 2020 series of event from 15 September to 30 November 2020 .