Abuse of dangling DNS records on cloud platforms
Guest Post: Real-life hijacks of cloud resources identified for the first time.
View ArticleExploring the realm of cyber early warning systems
Guest Post: Applying physical early warning system frameworks to cyber hazards.
View ArticleForgotten protocol chronicles: Do not underestimate the installed base
Guest Post: The stubborn persistence of legacy technologies.
View ArticleMobile Internet prices falling in Papua New Guinea
Guest Post: After years of high prices for mobile data in Papua New Guinea, consumers are now able to access lower prices that represent better value.
View ArticleEmail is getting harder to self-host. Or is it?
About new email deliverability guidelines for Google, Yahoo, and Outlook.
View ArticleCoherent optical transceivers
How to extract greater capacity and reach from optical systems. Why is it useful?
View ArticleOpen source IP blacklist checker tool
Guest Post: AbuseBox can check and monitor IP address blacklists and send delist requests.
View Article[Podcast] Using fibre optics to measure vehicle traffic
Dr Mona Jaber from QMUL discusses her research into the use of fibre optic communication systems to measure traffic, digital twins and social-science led research.
View ArticleDestination-Adjacent Source Address spoofing
Guest Post: With a side of IP TTL-based origin triangulation, is this a new surveying method, a unique attack, or just a scanner malfunction?
View ArticleIn-network acceleration for AI / ML workloads
Guest Post: How programmable switches can handle collective offloading seamlessly. Challenges and future trends.
View ArticleiOS upgrade using network automation tools
How I leveraged APNIC Academy training into real-world productivity.
View ArticleInternet sanctions as a response — diverging actions and mixed effects
Guest Post: New research studies the implementation of Internet sanctions in Europe.
View ArticleIPv6 prefix lengths
What lengths are commonly used by network operators to assign site prefixes to each customer?
View ArticleHigh-speed packet transmission in Go: From net.Dial to AF_XDP
Guest Post: Pushing limits in Go — from net.Dial to syscalls, AF_PACKET, and lightning-fast AF_XDP. Benchmarking packet sending performance.
View ArticleEnhancing the security and efficiency of Member account management
APNIC will significantly upgrade the security and user experience for users of the Member account management system.
View ArticleA first look at suspicious IRR records
Guest Post: Proposing and validating a workflow to identify suspicious IRR records.
View Article[Podcast] Measuring Starlink TCP performance
Geoff Huston explores the performance of the BBR and Cubic flow control algorithms on the Starlink network through comprehensive measurements.
View ArticleHow SSH got to be on port 22
How SSH was neatly assigned between ports 21 (Telnet) and 23 (FTP) — two protocols it was set to succeed.
View ArticleCommand-line routing stats with BGPKIT Monocle and Cloudflare Radar API
Guest Post: With BGPKIT Monocle, users can glance at routing stats for any ASN, economy, or the whole Internet or look up prefix origins and examine their RPKI validation status as well as prefix...
View Article