Today's Network Break discusses an acquisition by Palo Alto Networks that targets the security of Infrastructure as Code, a souped-up firewall for Microsoft Azure, a new private cloud option from Dell, commentary on the wisdom--or lack thereof--about gathering in person in Barcelona for a wireless convention, and more tech news.
The post Network Break 321: Palo Alto Buys Bridgecrew For IaC Security; Azure Steps Up Its Firewall Game appeared first on Packet Pushers.
Cybercrime campaigns can last days or months, but the malicious actors behind them can be active for years.
As it’s often difficult to have first-hand information about the evolution of specific gangs (e.g., changes in membership and leadership, or motivations behind actions), the threat intelligence community generally resorts to tracking the most observable aspects of these criminal enterprises: the malware that is delivered to the victims and the infrastructure that is used to control compromised systems and collect sensitive information.
Malware campaigns are almost always trans-national in terms of both targets and infrastructure, covering multiple countries and sometimes spanning multiple continents. Therefore, it’s difficult to carry out coordinated law enforcement efforts (especially given that many law enforcement agencies are already stretched thin), and the defenses against these threats are primarily localized to specific countries or organizations.
However, sometimes the cyber threats are so egregious that they trigger the attention of a large group of people, resulting in major takedown operations such as 2011’s “Operation Ghost Click” or the Microsoft-led takedown of the TrickBot infrastructure in October 2020.
It was one of these efforts, and a historical one in this case, that brought down Emotet at the end of January 2021 — a feat that many considered impossible.
“Operation Ladybird” saw the law enforcement agencies of multiple countries (including the US, the UK, Canada, Germany, France, the Netherlands, Ukraine, and Lithuania) cooperate to eradicate the Emotet infrastructure (see Figure 1).
Emotet, introduced in 2014 as a banking Trojan, has been Continue reading
Before I continue, I want to remind you what the purpose of this little series of posts is. The point is not to convince you to never use BGP in the DC underlay ever again. There’s a lot of BGP deployed out there, and there are lot of tools that assume BGP in the underlay. I doubt any of that is going to change. The point is to make you stop and think!
Why are we deploying BGP in this way? Is this the right long-term solution? Should we, as a community, be rethinking our desire to use BGP for everything? Are we just “following the crowd” because … well … we think it’s what the “cool kids” are doing, or because “following the crowd” is what we always seem to do?
In my last post, I argued that BGP converges much more slowly than the other options available for the DC fabric underlay control plane. The pushback I received was two-fold. First, the overlay converges fast enough; the underlay convergence time does not really factor into overall convergence time. Second, there are ways to fix things.
If the first pushback is always true—the speed of the underlay control plane Continue reading
Today’s Tech Bytes podcast, sponsored by Aruba, dives into an SD-WAN deployment with InterBank. Guest Daniel Ruhl, Senior VP and Director of IT at InterBank, turned to Aruba's EdgeConnect SD-WAN edge platform to bond MPLS connections with broadband at each branch to improve the quality of experience while also retiring legacy infrastructure.
The post Tech Bytes: InterBank Invests In Aruba EdgeConnect To Speed Branch Performance (Sponsored) appeared first on Packet Pushers.
No news for you: Facebook has blocked Australians from viewing or sharing news on its site in response to a proposed law that would require social media sites and other online services to pay news publishers, the BBC reports. The “power play” may backfire, however, “given how concerned many governments have grown about the company’s unchecked influence over society, democracy and political discourse,” The Associated Press says.
SpaceX rejected: A village in France is not interested in becoming the site of a ground station for SpaceX’s satellite-based broadband service, Yahoo Finance says. Residents of Saint-Senier-de-Beuvron are concerned about the impact of the antennas on the health of residents, said Noemie Brault, deputy mayor in the village. Still, many supporters of the SpaceX Starlink project see major benefits, including expanded Internet access to low-income nations, writes Larry Press, an information systems professor at California State University. Press writes on CircleID.com that connections to India, for example, are likely to serve community organizations, clinics, schools, and businesses.
No pictures, please: Facial recognition startup Clearview AI is in trouble in Canada for collecting photos of the country’s residents without their permission, TechCrunch reports. Collecting the photos violated Canadian privacy regulations, the country’s Continue reading
A few weeks ago Adrian Giacometti described a no-stretched-VLANs disaster recovery design he used for one of his customers.
The blog post and related LinkedIn posts generated tons of comments (and objections from the usual suspects), prompting Adrian to write a sequel describing the design requirements he was facing, tradeoffs he made, and interactions between server and networking team needed to make it happen.
A few weeks ago Adrian Giacometti described a no-stretched-VLANs disaster recovery design he used for one of his customers.
The blog post and related LinkedIn posts generated tons of comments (and objections from the usual suspects), prompting Adrian to write a sequel describing the design requirements he was facing, tradeoffs he made, and interactions between server and networking team needed to make it happen.
Hello my friend,
Quite often, when we do the troubleshooting of our networks and systems, we want to figure out, which hosts are alive in the certain range. The quickest and the easiest way (though, not 100% accurate) is to run the ping against a specific range of IPs. There is a brilliant tool for this purpose, which is called fping.
1
2
3
4
5 No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.
All the time, when the outage is happening in the production environment, either with the network or server/application infrastructure, the race starts to restore the service as soon as possible. Automation is a key helper there.
In our trainings, the Live Network Automation Training (10 weeks) and Automation with Nornir (2 weeks), we explore a lot of real use cases, where the automation helps you to validate the state of you network and change it if necessary. You will learn the whole spectre of Continue reading