Security News
As more and more networks are implementing Resource Public Key Infrastructure validation and signing of their BGP routes-to protect themselves against route hijacks and leaks, what should happen in case the critical RPKI goes down? ARIN plans on performing unannounced maintenance of its RPKI, sometime in July, for about thirty minutes to check if networks are adhering to BGP best practices.
One of America's largest broadband providers, has now deployed RPKI on its network to defend against BGP route hijacks and leaks. "In practical terms, it means that Comcast now both cryptographically signs route information and validates the cryptographic signatures of other networks' route information."
A large BGP routing leak that occurred last night disrupted the connectivity for thousands of major networks and websites around the world. Although the BGP routing leak occurred in Vodafone's autonomous network based in India, it has impacted U.S. companies, including Google, according to sources.
While Exploitable Protocols and Processes Persist, Adoption of Secure Fixes LagsThe internet is composed of a series of networks built on trust. But they can be abused due to weaknesses in older...
An experiment to make the internet safer ended up breaking parts of it last week.
This is a really interesting story of an ad fraud scheme that relied on hijacking the Border Gateway Protocol: Members of 3ve (pronounced "eve") used their large reservoir of trusted IP addresses...
Important Google services were inaccessible for some users on Monday due to a BGP leak that caused traffic to be directed through Russia, China and Nigeria. It’s unclear if the incident was caused...
Researchers claim that unusual BGP routing changes are actually man-in-the-middle surveillance.
BGP (Border Gateway Protocol) routing isn’t secure and organizations should embrace Resource Public Key Infrastructure (RPKI) to improve security, Cloudflare says. read more
Several payment processing companies in the United States were targeted recently in BGP hijacking attacks whose goal was to redirect users to malicious websites, Oracle reported last week. read more