<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Engineering on Wirez</title><link>https://wirez.top/tags/engineering/</link><description>Recent content in Engineering on Wirez</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 31 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://wirez.top/tags/engineering/index.xml" rel="self" type="application/rss+xml"/><item><title>BGP hijacking in 2025: When forged docs beat RPKI</title><link>https://wirez.top/posts/bgp-hijacking-in-2025-when-forged-docs-beat-rpki/</link><pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/bgp-hijacking-in-2025-when-forged-docs-beat-rpki/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">In July 2025, attackers bypassed cryptographic safeguards by manipulating a multinational provider through forged documents and social engineering. This incident proves that &lt;strong>BGP route hijacking&lt;/strong> has evolved from a purely technical exploit into a hybrid threat where human deception defeats &lt;strong>RPKI validation&lt;/strong>. While networks obsess over protocol anomalies, adversaries now target the administrative onboarding processes that grant legitimacy to malicious routes.&lt;/p></description></item></channel></rss>