Worth Reading: Upgrade Resolvers to Stop New Kind of Random Subdomain Attack

This article describes a newly discovered DNS protocol vulnerability that affects most recursive DNS resolvers. NXNSAttack allows the execution of random subdomain attacks using the DNS delegation mechanism, resulting in a big packet amplification factor. —Petr Špaček

Worth Reading: Getting IPv6 private addressing right

Having had some involvement in the site-local deprecation discussions and the subsequent ULA discussions in the IETF, starting in 2002, I’ve since seen several examples of ULAs being incorrectly treated as though they were the exact IPv6 equivalent of IPv4’s RFC 1918 private addresses. —Mark Smith

Worth Reading: 5 More Security Risks for Infrastructure-as-Code

Provisioning and managing cloud infrastructure through code — such as Terraform, AWS Cloud Formation templates, Azure Resource Manager templates and Kubernetes YML files — enables agility. It also provides an opportunity to embed security earlier in the development lifecycle and reduce the attack surface before infrastructure is provisioned. In order to enforce the right security controls, it is important to understand the top risks associated with infrastructure as code (IaC). —Piyush Sharrma

Worth Reading: Winning with Cyber Threat Intelligence

In this final article of our trilogy, we investigate how a cyber threat intelligence (CTI) analyst and associated programmes provide insight about physical and cyber threats to your organisation. The value of these insights is reflected in the wins, which come as a result of context building, holistic understanding, and enhanced awareness in order to outmanoeuvre malicious actor(s). —Zoe Rose

Worth Reading: Another Victim of Sturgeon’s Law

So what’s the big deal with intent-based networking? After everyone realized SDN is an ill-defined lame duck, someone invented another random buzzword to get funding, VCs got a new hype balloon to invest in, and industry analysts were only too happy to have another category to draw quadrants in. A pure win-win-win scenario. —Ivan Another Victim of Sturgeon’s Law

Worth Reading: USB Killers Pose Real Threat

Makers of USB Killers say they sell them so people or companies interested in testing their devices for protection against such attacks can do so. But that also means anyone with ill intent can just as easily acquire one. —VP Pai

Worth Reading: The Upload Crisis

One of the more interesting statistics that caught my eye was when Comcast reported that upload traffic on their network was up 33% since March 1. Comcast joins the rest of big ISPs in saying that their networks are handling the increased traffic volumes. —Doug Dawson

Worth Reading: Observability and the Misleading Promise of AIOps

The hype behind AIOps masks the reality of its readiness to meet its goal. Can AIOps solve the underlying problems that plague Operations? Simply put, no. —Danyel Fisher

Worth Reading: The 1M Day Isn’t That Far Away

In less than two years from now, the number of IPv4 prefixes in the global BGP routing table will hit the one million figure. Should you be worried? Most probably not, but better safe than sorry. —Berislav Todorovic

Worth Reading: Cyber Subterfuge and Curious Sharks Threaten the World’s Subsea Fiber-Optic Cables

Under the world’s oceans lie 550,000 miles of submarine cables. According to a March 2019 report by StableSeas, this subsea network is responsible for 97% of intercontinental communication and transmits $10 million worth of financial transactions every day. —Alison Diana