Blog
-
Double-Edged Sword: How Attackers Use the Same Cloud Infrastructure We Rely On
Malicious actors are increasingly favoring partial use of cloud services rather than fully migrating their infrastructure.
Categories: -
A Decade-long Landscape of Advanced Persistent Threats
Between 2014 and 2023, 154 countries experienced an Advanced Persistent Threat (APT) attack.
Categories: -
BGP Vortex: Internet Routing Vortices Create Outages by Preventing Convergence
A BGP Vortex exploits widely used routing policies to trigger persistent oscillations between major Internet networks that can lead to Internet outages.
Categories: -
Exploring the Potential of RPKI Signed Checklists: The Results Are In
The Internet Society recently explored the feasibility of RSCs to strengthen the resilience and trustworthiness of the Internet's routing system.
Categories: -
VPN or Vpwn: How Afraid Should You Be of VPN Traffic Identification?
A recent study finds that popular VPN protocols can be easily identified and blocked by ISPs.
Categories: -
Who Owns, Operates, and Develops Your VPN Matters
New research shows that eight popular, commercial VPN apps operate deceptively, exposing more than 700 million users to authoritarian surveillance.
Categories: -
Chapters Leading the DNSSEC Charge in Africa
Internet Society Chapters have been collaborating with each other and coordinating with local stakeholders to advance DNSSEC adoption across Africa.
Categories: -
Gabon, Georgia, and Papua New Guinea Country Code Domains Go Secure
168 countries now have DNSSEC-enabled ccTLDs.
Categories: -
Measuring the Effects of the CrowdStrike Outage on Internet Traffic
Last year's faulty CrowdStrike update had a nuanced impact on the Internet traffic of various organizations and sectors.
Categories: -
Burkina Faso Secures Top Level Domain
Burkina Faso is the 32nd African country to deploy DNSSEC at its country code Top-Level Domain.
Categories: -
HTTP Conformance vs. Middleboxes: Identifying Where the Rules Break Down
Internet standards need to provide clearer and rigorous guidelines to overcome middlebox modifications.
Categories: -
Recapping PIMF Malaysia: 11 Views on Internet Resilience
Internet resilience requires taking a holistic view of the many components and actors that enable the Internet.
Categories:












