A tale of two honeypots in Bhutan
Honeypots can be useful tools for security research, teaching us about attackers’ methods.
Honeypots can be useful tools for security research, teaching us about attackers’ methods.
Guest Post: MalConfScan is a new malware analysis and memory forensics tool developed by JPCERT/CC to assist with incident investigations.
TechCERT’s Dileepa Lathsara says cybersecurity is now a board-level discussion in Sri Lanka.
APNIC participated at the 31st Annual FIRST Conference in Edinburgh, Scotland, from 16 to 21 June 2019.
Remote Triggered Blackholing has major limitations when applied at Internet Exchange Points.
Guest Post: New Network Time Protocol client secures against time shifting by man-in-the-middle attackers.
Guest Post: Have you ever considered when you use Google DNS as your resolver, whether your queries may be answered by somebody else?
Guest Post: Study seeks to understand how blackholing is used following DDoS attacks to improve mitigation techniques.
Guest Post: Prepending-to-all is a self-inflicted and needless risk that serves little purpose.
Guest Post: Avoiding the use of IP fragmentation in the DNS can assist with reducing the risk of DNS cache poisoning attacks.