ZHtrap botnet uses honeypot to harvest infected devices
Guest Post: Analysis of a new type of botnet.
Guest Post: Analysis of a new type of botnet.
Spoofed packets allow senders to hide their source address. How do they work and why do they do it?
Fixing your incorrect or outdated ROAs is easy — here’s how.
A new feature in DASH allows users to receive recurring reports of their network’s top offending IP addresses.
Guest Post: Analysing hundreds of billions of daily DNS queries to produce actionable threat intelligence.
Guest Post: As zero trust becomes more pervasive, how do we maintain an assurance of its effectiveness?
APNIC has a tool which looks at malicious traffic. So let’s take a deep dive!
Guest Post: Exploring common knowledge gaps in RPKI and how to address them.
Guest Post: Internet security trends and how they will affect the future.
Adli Wahid presented on the APNIC Honeypot project and DASH at the FIRST 1st Regional Virtual Lightning Talk Session, held online on 25 February 2021.