<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Wirez</title><link>https://wirez.top/tags/security/</link><description>Recent content in Security on Wirez</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 24 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://wirez.top/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Route origin security gaps in East Asia's IPv4</title><link>https://wirez.top/posts/route-origin-security-gaps-in-east-asias-ipv4/</link><pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/route-origin-security-gaps-in-east-asias-ipv4/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Global &lt;strong>Route Origin Authorization&lt;/strong> coverage hit 60.3% in February 2026, yet APNIC&amp;#039;s uneven 55. &lt;a href="https://blog.apnic.net/2026/02/20/rpkis-2025-year-in-review/" target="_blank" rel="noopener noreferrer">APNIC&amp;#039;s rpkis 2025 year in review&lt;/a> 5% adoption rate exposes critical interconnectivity risks.&lt;/p></description></item><item><title>RIPE Fellowship 2026: Why 10 New Fellows Matter</title><link>https://wirez.top/posts/ripe-fellowship-2026-why-10-new-fellows-matter/</link><pubDate>Tue, 17 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/ripe-fellowship-2026-why-10-new-fellows-matter/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">The &lt;a href="https://www.ripe.net/" target="_blank" rel="noopener noreferrer">RIPE NCC&lt;/a> selected 16 new fellows for RIPE 92 and 93 on 17 Mar 2026 to fix the broken pipeline of internet governance talent. &lt;a href="https://www.ripe.net/publications/docs/ripe-848/" target="_blank" rel="noopener noreferrer">Ripe 848&lt;/a> This program is not merely a travel grant; it is a strategic intervention designed to align individual ambition with the critical &lt;strong>infrastructure gaps&lt;/strong> plaguing the region. While global connectivity hovers near saturation, the technical mechanisms ensuring that connectivity remains secure are failing to keep pace with user growth.&lt;/p></description></item><item><title>Cloudflare remediation stops SaaS link risks fast</title><link>https://wirez.top/posts/cloudflare-remediation-stops-saas-link-risks-fast/</link><pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/cloudflare-remediation-stops-saas-link-risks-fast/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Cloud attacks surged 26% in 2024, proving that visibility without &lt;strong>automated remediation&lt;/strong> is merely a delay tactic. &lt;a href="https://blog.cloudflare.com/casb-ga/" target="_blank" rel="noopener noreferrer">Cloudflare&amp;#039;s casb ga&lt;/a> The narrative explores how security teams can finally bypass the friction of manual ticketing and external admin consoles by using &lt;strong>Remediation&lt;/strong> actions directly inside the &lt;strong>Cloudflare One&lt;/strong> dashboard. Instead of flagging overshared files in &lt;strong>Microsoft 365&lt;/strong> or &lt;strong>Google Workspace&lt;/strong> and waiting for IT to respond, administrators can now instantly revoke public links or restrict domain-wide access with a single click. This capability addresses the critical gap where dangerous configurations persist simply because the fix requires too many steps across disjointed interfaces.&lt;/p></description></item><item><title>Reactive detection leaves invisible weaknesses open</title><link>https://wirez.top/posts/reactive-detection-leaves-invisible-weaknesses-open/</link><pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/reactive-detection-leaves-invisible-weaknesses-open/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With global spending hitting &lt;strong>$520 billion&lt;/strong> in 2026, email security still fails because its worst vulnerabilities remain invisible. The industry&amp;#039;s reliance on reactive fixes creates a dangerous blind spot where only AI-driven analysis can reveal the threats that bypass initial filters. The narrative draws on Abraham Wald&amp;#039;s World War II insight regarding &amp;quot;planes that didn&amp;#039;t make it back&amp;quot; to illustrate how traditional defenses ignore messages that never trigger user reports. While organizations pour resources into perimeter defense, &lt;strong>detection gaps&lt;/strong> persist because standard improvements rely entirely on post-breach user submissions. This reactive loop ensures defenders only patch holes after attackers have already succeeded, leaving the most critical weaknesses unaddressed.&lt;/p></description></item><item><title>Cloudflare data reveals origin server lag today</title><link>https://wirez.top/posts/cloudflare-data-reveals-origin-server-lag-today/</link><pubDate>Fri, 27 Feb 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/cloudflare-data-reveals-origin-server-lag-today/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Over 60% of client connections now support post-quantum encryption, yet origin server readiness remains the critical blind spot. &lt;a href="https://blog.cloudflare.com/cloudflare-radars-2023-overview-of-new-tools-and-insights/" target="_blank" rel="noopener noreferrer">&lt;a href="https://www.cloudflare.com/" target="_blank" rel="noopener noreferrer">Cloudflare&lt;/a> radars 2023 overview of new tools and insights&lt;/a> &lt;strong>Cloudflare Radar&lt;/strong> exposes this disconnect by shifting visibility from edge metrics to the actual security posture of customer infrastructure. The platform&amp;#039;s latest update argues that true durability requires auditable proof of &lt;strong>hybrid key exchange&lt;/strong> deployment and rigorous &lt;strong>routing security&lt;/strong> validation, not just theoretical compatibility.&lt;/p></description></item><item><title>Routing security gaps threaten your 2026 supply chain</title><link>https://wirez.top/posts/routing-security-gaps-threaten-your-2026-supply-chain/</link><pubDate>Thu, 26 Feb 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/routing-security-gaps-threaten-your-2026-supply-chain/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With global cybercrime costs hitting $10.8 trillion in 2026, ignoring &lt;strong>Internet routing security&lt;/strong> is financial suicide. Dan Fidler&amp;#039;s February 2026 MANRS paper argues that enterprises must treat the global routing system as a critical, under-managed supply chain dependency rather than a background utility. The thesis is clear: voluntary operator goodwill has failed, and only aggressive &lt;strong>demand-side pressure&lt;/strong> via enterprise procurement can force the adoption of necessary safeguards.&lt;/p></description></item><item><title>ASPA vs PeerLock: The Real Tradeoffs Explained</title><link>https://wirez.top/posts/aspa-vs-peerlock-the-real-tradeoffs-explained/</link><pubDate>Sun, 01 Feb 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/aspa-vs-peerlock-the-real-tradeoffs-explained/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With &lt;a href="https://www.arin.net/" target="_blank" rel="noopener noreferrer">ARIN&lt;/a> reporting full &lt;a href="https://datatracker.ietf.org/doc/html/rfc9582" target="_blank" rel="noopener noreferrer">ASPA&lt;/a> availability in March 2026, the era of theoretical BGP security has abruptly ended. &lt;a href="https://www.arin.net/blog/2026/03/31/arin-bits-march-2026/" target="_blank" rel="noopener noreferrer">Arin bits march 2026&lt;/a> The industry&amp;#039;s reliance on manual &lt;strong>AS-PATH policies&lt;/strong> is no longer a stopgap but a deliberate strategic choice between proprietary control and standardized validation. As networks face increasing pressure to secure the shared substrate of global IP connectivity, operators must decide whether to implement sharp, exclusionary tools like &lt;strong>peerlock&lt;/strong> or adopt the broader, automated reach of &lt;strong>ASPA&lt;/strong>.&lt;/p></description></item><item><title>ASPATH length traps: When short routes risk security</title><link>https://wirez.top/posts/aspath-length-traps-when-short-routes-risk-security/</link><pubDate>Thu, 01 Jan 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/aspath-length-traps-when-short-routes-risk-security/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Shorter &lt;strong>AS_PATH lengths&lt;/strong> win route selection when other BGP criteria tie, per RFC 4271.&lt;/p>
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">In reality, actual reachability depends entirely on external &lt;strong>filtering policies&lt;/strong> and &lt;strong>RPKI validation&lt;/strong>, not just path metrics. As bogdancyber clarified on the NANOG mailing list in January 2026, conflating path brevity with trust creates dangerous blind spots in &lt;strong>risk modeling&lt;/strong> for potential hijacks.&lt;/p></description></item><item><title>Machine learning misses real BGP security flaws</title><link>https://wirez.top/posts/machine-learning-misses-real-bgp-security-flaws/</link><pubDate>Thu, 01 Jan 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/machine-learning-misses-real-bgp-security-flaws/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Tom Beecher rejected the &lt;a href="https://datatracker.ietf.org/doc/html/rfc4271" target="_blank" rel="noopener noreferrer">BGP&lt;/a> Security Intelligence Platform immediately after reading claims that &lt;strong>as_path length&lt;/strong> dictates routing credibility. This skepticism highlights a critical flaw in current predictive modeling: relying on outdated heuristics rather than verifiable propagation data. The article argues that effective &lt;strong>risk assessment&lt;/strong> demands discarding static path assumptions in favor of dynamic, origin-side vulnerability scoring combined with real-time structural analysis.&lt;/p></description></item><item><title>Predictive routing intelligence stops BGP outages early</title><link>https://wirez.top/posts/predictive-routing-intelligence-stops-bgp-outages-early/</link><pubDate>Thu, 01 Jan 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/predictive-routing-intelligence-stops-bgp-outages-early/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Only 38% of RADB records matched &lt;a href="https://datatracker.ietf.org/doc/html/rfc6480" target="_blank" rel="noopener noreferrer">RPKI&lt;/a> data in 2021, proving that reactive monitoring leaves the majority of routing infrastructure exposed to preventable hijacks. The &lt;strong>BGP Security Intelligence Platform&lt;/strong> fundamentally shifts operations from passive alerting to &lt;strong>predictive routing-risk intelligence&lt;/strong> by analyzing origin-side vulnerabilities before they trigger outages. This architecture moves beyond simple route change notifications to anticipate where malformed announcements will propagate based on structural weaknesses.&lt;/p></description></item></channel></rss>