Millions of IP addresses of African firms stolen – AFRINIC
If you are thinking that stealing IPs pertains to the Western world, then you are mistaken. AFRINIC (African Network Information Centre) recently reported after an internal audit that over 4.1 million IP addresses were stolen from African firms, were used inappropriately and allotted to other organisations (IP addresses of African firms). This kind of theft […]
How does Cyber-attacks target supply chains
Cyber security is not to be taken lightly, especially in the wake of recent attacks by hackers on infrastructure of government and private organizations around the world. It is of utmost importance that organizations safeguard their data and client information under more secure and resilient infrastructure, according to the Cybersecurity and Infrastructure Agency. The agency has been […]
Vulnerabilities in open-source networking libraries affect millions of mobile devices
Having a smart phone is one thing, but getting your mobile device hacked or hijacked by attackers may not be on your cards. But, recently, there were 33 vulnerabilities that affected million of smart devices around the world. Amnesia 33 vulnerability is a set of 33 vulnerabilities that affected various Embedded, IoT, OT and IT […]
Embedded vulnerabilities found in Open-Source networking stacks
Open-source is an important part of the software and communications industry, especially used for the implementation of most internet protocols. There are many who use these open-source networking stacks where many tools and applications are required, like the popular TCP/IP stacks. What is BGP Security? Why is it essential in the Internet Protocol? There are […]
Impact Of Covid 19 On DDI Industry in 2020
The DDI Industry is a unified service that comprises DNS, DHCP, and IPAM. These services or solutions provide various tasks that enable the management of internet protocol (Impact Of Covid 19 On DDI Industry in 2020). There is an upsurge in instances of BYOD or Bring Your Own Device at workplace or fall in operational […]
Data Exfiltration in IPv6
IPv6 adoption is still nascent and yet there have been many studies that show that Data exfiltration via IPv6 is possible. A whole new range of scenarios is open for hackers to breach IPv6 connections across networks (Data Exfiltration in IPv6). Did you know? The data brokering industry stands at more than $200 billion around […]
Ping of Death, patch it now or face hacker attacks
Internet Protocol is very big and keeping it secure can be difficult, especially at the user level. The IPv4 has been prone to many attacks, especially DoS (Denial of Service) attacks. One of the DoS attacks that have been famously used by hackers is the Ping of Death (PoD). The Internet Control Message Protocol (ICMP) is the […]
Different types of IP addresses – Quick Guide
The Internet and IP addresses are important factors that connect us all to the rest of the world. Growing businesses and a growing number of employees requires many IP addresses (Types of IP addresses). But, there are many types of IP addresses, and your business may not know which IPs you require, that is where […]
What is BGP Security? Why is it essential in the Internet Protocol?
The internet is being used extensively by businesses. To connect with different networks organizations use BGP for routing web traffic and communicating with different networks. But many times, businesses also face issues with BGP, and we will address such issues here, and how they can be countered (Networks against BGP route). How to find your […]
How to find your local and external address?
Your business may require setting up of various infrastructure to strengthen it and enable the smooth running of an organization. For settings up any new hardware like printer, scanner, etc. or to resolve technical problems on your network, you may need to find out your local or internal IP address. Whereas if you happen to […]