Cyberwar is today’s reality. We’ve moved from a world of cyber-criminal threats to an interconnected arena where any malicious activity is feasible. Cyber-Kinetic attacks that destroy, kill, and massively disrupt civil society are part of our new security threat landscape reality. Geography will not help. The massively interconnected Internet means that you are a cyberwarrior’s
Category: Operator’s Security Toolkit
IP Anti-Spoofing Research Papers
We have a long library of IP Spoofing Research papers from universities worldwide. These papers are a rich & productive field of academic study exploring the risk, technique, tools, and deployment of IP anti-spoofing throughout the Internet. This page works to collect all papers in one place. Note: The materials are sorted alphabetically. This does
Loading Spoofer to Fight DDoS
Do you run a network? Do you secure an organization? Do you build applications? Do you want DDoS Attacks to be easy? Of course not! Everyone running, securing, or building something on the Internet does not want it easy to attack that service. We’re asking people to load the Spoofer application to Fight DDoS. Loading Read More
Practical Security Guides, Projects, & Workbooks
Do you feel overwhelmed by the barrage of security white papers, webinars, and guides? Are you parallized trying to figure out what you need to do first to get ready for the next attack? We don’t need more security guides, we need a consolidated landing that pulls in all the advice into one place. We
How To Secure Mikrotik Devices
(Version 1.0) Mikrotik devices are wonderful networking tools. They offer flexibility and cost empowerment to solve networking problems. But, the way we deploy Mikrotiks in the industry is creating multiple security risks. People are not spending the time to secure Mikrotik devices. It cannot be ignored that Mikrotik devices are 2022’s most dangerous malware platform.
IPv4/IPv6 Anti-Spoofing – Source Address Validation (SAV) – Techniques & Tools
IPv4/IPv6 Anti-Spoofing through Source Address Validation (SAV) is one of the most promoted security best practices. We have achieved a wide range of SAV deployment, but we also run into the tedious 20% of the Internet that takes more human-intensive SAV deployment work. This guide is provided to help operators, engineers, policymakers, and executive decision-makers
Are your Customers a victim of the Zimbra Exploit?
We have an active Zimbra exploit, in the wild, with espionage and “others” trying to get into +22: vulnerable systems. Everyone using Zimbra Collaboration (ZCS) who has not recently patched is at risk. Volexity Threat Research responsibly disclosed this risk on August 10th, 2022. Zero-Day exploitation was active on the disclosure day. Shadowserver is tracking Read More
Don’t let your Firewalls be STUN DDoS Reflector
Your firewalls can be used as a STUN DDoS reflector to attack others on the Internet. Open UDP firewall ports for STUN (Session Traversal Utilities for NAT) are being exploited for DDoS reflection. Your network is most likely one of those networks. Shadowserver now detects 101k IPv4 and 2.9K IPv6 accessible UDP STUN services. These Read More
Why are you leaving your SNMP ports open to the world?
Too many organizations are ignoring the risk of SNMP abuse and leaving their SNMP ports open to the world. Simple Network Manage Protocol (SNMP) is one of our core networking building blocks. We – the community who build and run networks – use all types of networks. It is a powerful tool for monitoring, managing, Read More
DNS Cache Poison Attacks are Still a Risk
Nozomi Networks find an easier path for DNS Cache Poison Attacks on ICS, CPEs, and other IoT devices. Nozomi Networks disclosed long-term and persistent vulnerability with all versions of uClibc and uClibc-ng (see Nozomi Networks Discovers Unpatched DNS Bug in Popular C Standard Library Putting IoT at Risk by Giannis Tsaraias and Andrea Palanca | Read More