Skip to main content
HunCERT turns 20
Solving open resolver
The open resolver is a DNS resolver, which receives queries from every IP-address and is openly accessible on the internet. Open resolvers can be used by cybercriminals for DNS reinforcement attacks against 3rd parties, are sensitive to DNS-cache-poisoning, and can be exploited in the case of other DNS attacks.
Electronic evidence - a basic guide for First Responders
ENISA's report helps CSIRTs and local authorities in the fight against cybercrime by identifying good practices and seeks to facilitate cooperation between forensic and cybercrime organisations.
Authentication and verification of domain name owners
ENISA's 2023 publication provides an overview of domain name holder authentication and verification in the context of domain name registration. It identifies security challenges, best practices, security controls and associated risks in the domain name registration ecosystem.
Cybersecurity: how the EU tackles cyber threats
The European Council's dedicated policy page provides a lot of useful information on EU cybersecurity issues.
DNS Abuse Techniques Matrix
The First DNS Abuse SIG's latest publication aims to help incident responders better manage DNS abuse.
Archive of hacked websites
Many have heard about Zone-H, but maybe some are still new to the Zone-H's archive of digital attacks, or more precisely attacks against web-servers. This description is for them.
Web Hosting Professional's annual summary page contains more than 50 cybersecurity statistics on various topics. We also recommend resources for statistics related to botnet, phishing and spam.
Mitigating FREAK vulnerability
The FREAK (Factoring Attack on RSA-EXPORT Keys - CVE-2015-0204) is a type of SSL/TLS vulnerability that dates back to the 90’s. It makes it possible for hackers to access a website’s private key by accepting the HTTPS connections between clients and vulnerable servers.
Mitigating POODLE vulnerability
The POODLE (Padding Oracle on Downgraded Legacy Encryption - CVE-2014-3566) uses the SSL version 3.0 protocol's vulnerability. This vulnerability makes it possible for the attacker to intercept the communication encrypted with the SSLv3 protocol.