We Got Zoom Bombed

Do we ever grow up? Image presented by Zoom bomber. We recently hosted an invite-only meeting with some of our business partners and clients. We followed most of the basic security measures and best practices for Zoom calls. Yet we got Zoom Bombed! How? The technical details are not the core story here, though we... Continue Reading →

Cheers to the Pioneers

Author: James Shank View off San Francisco Pier 1 With NANOG78 just wrapping up in beautiful San Francisco, I am reflecting on my time here and the great conversations that I have had here at number 78 and past conferences. One particular aspect of my conversations stands out - the human narrative of the history... Continue Reading →

Webmin Vulnerability and Port Scanning Activity

The Webmin website states, "Webmin is a web-based interface for system administration for Unix." Many Hosting providers offer Webmin administration with their Virtual Private Servers. Recently, a presentation revealed backdoor code injected into the source for Webmin.  According to a Hacker News story published August 20: "The story started when Turkish researcher Özkan Mustafa Akkuş... Continue Reading →

Top 10 TCP Ports for Border Policy Review

Information Security guidance sometimes strikes practitioners as impractical. Many of us have more on our 'to do' list than we ever will complete. With that in mind, we put together our list of the Top 10 TCP Ports for Border Policy Review. Here, we use global counts of open ports and known security impacts to... Continue Reading →

Up ↑