|
You are here |
www.senki.org | ||
| | | | |
blog.caida.org
|
|
| | | | | [AI summary] The text discusses two main topics. First, it presents the work of the CAIDA team on improving the accuracy and reliability of Internet routing data through the use of multiple data sources and advanced techniques. This includes the development of the Internet Routing Registry (IRR) and the use of tools like speedtrap and SNMP to infer geolocation information. Second, it covers the team's research on the security of the IRR and the risks posed by malicious actors who may exploit the system to launch BGP hijacks and other attacks. The text highlights the importance of transitioning to more secure systems like the Resource Public Key Infrastructure (RPKI) and the need for greater coordination and validation across IRR databases to prevent abuse. | |
| | | | |
blog.360totalsecurity.com
|
|
| | | | | Recently, 360 Security Center observed a state-level cyber warfare attack against Ukraine for the purpose of sabotage, including distributed denial of service (DDoS) attacks, phishing scams, exploits, supply chain attacks, malicious data wipes disguised as ransomware Except for attacks, etc. | |
| | | | |
blog.talosintelligence.com
|
|
| | | | | CVE-2023-44487, a vulnerability in the HTTP/2 protocol, was recently used to launch intensive DDoS attacks against several targets. | |
| | | | |
techwireasia.com
|
|
| | | Withincreasing data breaches and cyber threats, organisations, particularly those in the financialservices sector, need to prioritise data protection and comply with privacy regulations. | ||