Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

Some Notes from RIPE-91
potaroo.net·6h
🌐DNS over QUIC
Flag this post
Understanding the Worst .NET Vulnerability
andrewlock.net·6h·
Discuss: Hacker News
🛣️BGP Hijacking
Flag this post
For DNSSEC And Why DANE Is Needed
blog.technitium.com·5h
🌐DNS Security
Flag this post
Cross-Paradigm Graph Backdoor Attacks with Promptable Subgraph Triggers
arxiv.org·13h
🧪CBOR Fuzzing
Flag this post
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.com·4h
🔍Vector Forensics
Flag this post
Making the Internet observable: the evolution of Cloudflare Radar
blog.cloudflare.com·1d·
Discuss: Hacker News
🕸️Mesh Networking
Flag this post
5 Essential Steps to Strengthen Kubernetes Egress Security
tigera.io·38m
📦Container Security
Flag this post
Securing the Wireless Perimeter: Modern Threats to AI, Hyperscale, Enterprise, and Classified Data Centers
bastille.net·3h
🕸️Mesh Networking
Flag this post
Quick question...
reddit.com·2h·
Discuss: r/homelab
🛣️BGP Hijacking
Flag this post
AI-Driven, Quantum-Ready Network Security
paloaltonetworks.com·3h
🏠Homelab Security
Flag this post
Schema-Validated, Rules-Guided, and Policy-Driven Experiences
apievangelist.com·8h
📋Format Specification
Flag this post
Mullvad DNS
mullvad.net·1h·
Discuss: Hacker News
🌐DNS over QUIC
Flag this post
Research Worth Reading Week 43/2025
pentesterlab.com·1d
🛡️Proof-Carrying Archives
Flag this post
Topological Data Persistence Analysis for Anomaly Detection in Complex Network Systems
dev.to·1d·
Discuss: DEV
🕳️Persistent Homology
Flag this post
NEWS ROUNDUP – 27th October 2025
digitalforensicsmagazine.com·1d
🌐DNS Security
Flag this post
Entering the Growing IPv4 Market: What Enterprises Should Do Now
circleid.com·1h
📡BGP Archaeology
Flag this post
Windows’ Built-in OpenSSH for Offensive Security
pulsesecurity.co.nz·1d
🎯NTLM Attacks
Flag this post
Vulnerability Management – Process Perspective
blog.nviso.eu·9h
🔐Capability Systems
Flag this post
Satellite Snooping Reveals Sensitive Unencrypted Data
hackaday.com·1d
🕳️Information Leakage
Flag this post
When eBPF Isn't Enough: Why We Went with a Kernel Module
riptides.io·17h·
Discuss: Hacker News
🛡️eBPF Security
Flag this post