Hot Topics:   Access Providers    Broadband    Cybersecurity    Domain Names    DNS Security    Cyberattack    Networks   
NordVPN Promotion

Featured Blogs

CaribNOG Partners with Global Infrastructure Body PCH to Strengthen Caribbean Resilience

Gerard Best CaribNOG and PCH have renewed their partnership to boost the Caribbean's Internet resilience, expanding technical capacity, advancing inclusive training, and strengthening the people and systems essential for recovery as islands rebuild after Hurricane Melissa.

Evaluating Starlink Performance: Implications for Digital Equity and Regulatory Compliance

Doug Dawson Despite its promise of universal access, Starlink often fails to meet broadband benchmarks across key markets. New data reveals fluctuating performance and raises questions about reliability, digital equity, and tiered service models.

The hiQ Decision Legalized Infrastructure Theft - We Need a Federal Fix

Areejit Banerjee The hiQ ruling erased legal protections against commercial scraping, leaving infrastructure providers to absorb escalating costs. Without federal action defining data misappropriation, a free-rider AI economy could undermine open networks, investment, and long-term data integrity.

Fiber and Public Safety: Enhancing Emergency Response Through Resilient Networks

Doug Dawson A new report from the Fiber Broadband Association details how fiber networks improve public safety and disaster response, offering real-world case studies that highlight the technology's resilience, reliability, and critical infrastructure value.

Starlink and the Seven Dwarfs

Larry Press Starlink dominates the satellite internet race, echoing IBM's past supremacy in computing. But geopolitical divides, advancing rivals, and Elon Musk's controversies suggest its lead will narrow as competitors gain ground in a fragmented global market.

Q3 Broadband Report Shows Uploads Rising Faster Than Downloads

Doug Dawson OpenVault's latest broadband report shows U.S. households using more data, with uploads rising faster than downloads and a major shift toward midrange speed tiers. Growing gaming, streaming, and cloud activity continues to reshape network demand and subscriber behavior.

Google’s Lighthouse Lawsuit - Disrupting the Cybercrime Supply Chain

Karen Rose Google's lawsuit against the Lighthouse phishing syndicate exposes the industrial scale of cybercrime, highlighting how criminals exploit easy access to digital infrastructure to scam millions. The broader supply chain enabling such operations demands urgent reform.

Granular Regulation: A Future-Ready Framework for Effective AI Governance and Beyond

Sami Salih Granular regulation offers a new governance framework for AI, blending flexibility with enforceability. By translating broad principles into risk-sensitive, technical mandates, it overcomes the rigidity of rule-based models and the vagueness of principle-based approaches.

How Regional Internet Registries Should Adapt to Current Markets

Vincentas Grinius Outdated policies at Regional Internet Registries hinder the efficient transfer and leasing of IP addresses, driving up internet costs in emerging markets and limiting innovation. A faster, more inclusive governance model is urgently needed.

Internet Evolution: Moore’s Law, Addressing Architectures, and the Future of Internet Scale

Geoff Huston The Internet has evolved from a scarcity-driven system into one defined by abundance, reshaping infrastructure, governance, and economic models while challenging long-held assumptions about addressing, network roles, and the future of protocol design.

Three Views of Multistakeholder Leadership in the Age of Sovereignty

Gregory Francis As multistakeholder governance nears a critical juncture, leaders must navigate diverging views, geopolitical pressures and technological upheaval. With sovereignty concerns mounting, the Internet's institutions face a complex future that demands deft stewardship.

Internet Society Seeks Nominations for 2026 Board of Trustees

Lauren Terrell The Internet Society is seeking nominations for its 2026 Board of Trustees. Four seats are open across its global stakeholder communities, offering an opportunity to help steer the future of a trusted, open Internet.

Broadband Speed and Market Signaling: Strategic Constraints in U.S. ISP Policy

Doug Dawson Despite early dismissals from cable giants, consumer demand and real-world use cases proved the value of gigabit broadband. Today, slow uploads and strategic pricing continue to signal an industry reluctant to embrace speed.

Unlike Earlier Revolutions, AI Is Threatening the Professional Class

Sami Salih Unlike past technological shifts, artificial intelligence is automating high-skilled professions before low-skilled ones. This reversal challenges long-held assumptions about job security, expertise, and governance, forcing policymakers to rethink regulation, trust, and digital sovereignty.

Incremental AI Risk: A Governance Lens for Digital Infrastructure and Public Policy

Sami Salih As artificial intelligence integrates into public infrastructure, it introduces new layers of systemic risk. Policymakers must shift focus from AI's potential to its exposure, applying governance models that reflect these emerging, compound vulnerabilities.

Limiting Large Network Outages

Doug Dawson As telecom networks grow more interconnected, local outages can now trigger regional or national disruptions. A recent article by Ookla outlines five critical steps operators must follow to prevent small faults from cascading into systemic failures.

Preparing DNSSEC for the Post-Quantum Era

Swapneel Sheth To prepare DNS security for a post-quantum future, Verisign and partners are testing new cryptographic strategies that balance security, performance, and feasibility, especially through the novel Merkle Tree Ladder mode for managing large signatures.

Entering the Growing IPv4 Market: What Enterprises Should Do Now

Vincentas Grinius With IPv4 addresses fetching up to $30 apiece and IPv6 adoption lagging, companies may be sitting on hidden digital assets. A strategic audit could unlock unexpected revenue and enhance long-term infrastructure planning.

DOTZON Study: Digital Company Brands 2025

Katrin Ohlmer DOTZON's 2025 study analyzes over 410 corporate dotBrands to reveal how companies strengthen digital identities through custom top-level domains. Audi retains first place, while newcomers like CRS and rising performers such as Schwarz demonstrate growing strategic use.

Using AI to Develop the Informal Sector in Africa

Katim Seringe Touray Artificial intelligence is transforming Africa's informal economy by improving access to finance, optimizing business operations, and helping small-scale entrepreneurs transition into the formal sector, despite challenges such as digital illiteracy and infrastructure gaps.

News Briefs

NANOG 95: From Faster Fibre to Route Leaks, Operators Face Old Problems with New Tools

The NANOG 95 conference spotlighted breakthroughs in fibre optics, wireless technology, routing security, and quantum computing, offering a forward-looking assessment of internet infrastructure and its vulnerabilities, as reported by APNIC's Geoff Huston. more

AWS Unveils Route 53 “Accelerated Recovery” to Bolster DNS Resilience

AWS is introducing Route 53 Accelerated Recovery to help organizations maintain DNS control during regional outages, offering a 60-minute recovery objective and sustained access to key API operations for critical updates and traffic management. more

US Senators Move to Shield Undersea Internet Cables from Global Threats

A bipartisan Senate bill seeks to strengthen U.S. oversight and global coordination to protect undersea fiber-optic cables, vital infrastructure increasingly targeted by geopolitical adversaries, natural disasters, and cyber or physical sabotage. more

China Spurs eSIM Boom as Global Connections Set to Quadruple by 2030

Global eSIM connections are projected to reach 4.9 billion by 2030, driven by China's rapid adoption, new provisioning standards, and growing demand across smartphones, industrial devices, and the expanding Internet of Things ecosystem. more

Configuration Chaos: Cloudflare Explains Major Outage in Detailed Post-Mortem

Cloudflare has detailed the cause of a global outage in a post-mortem report, revealing that a flawed internal database change -- not a cyberattack -- caused widespread service disruption across its network and customer systems. more

Cloudflare Outage Highlights Internet’s Growing Single Points of Failure

Cloudflare's global outage caused cascading failures across the internet, reigniting concerns about the concentration of web infrastructure and the urgent need for more resilient, transparent systems to support critical online services. more

AI System Abused in China-Linked Cyberattack, Says Anthropic

A Chinese-linked cyberattack exploited Anthropic's Claude AI to infiltrate global institutions with limited human input, prompting urgent calls for regulation and sparking debate over the growing autonomy of artificial intelligence in digital threats. more

AI Boom Spurs Record Investment in Undersea Cables Amid Geopolitical and Security Concerns

As AI accelerates global data demand, tech giants are investing heavily in subsea cables. These critical networks face rising geopolitical scrutiny and security risks, reshaping the future of digital infrastructure and global connectivity. more

Governance or Capture? Africa’s Internet Rules Face a Double Standard, Expert Warns

Alice Munyua criticises ICANN's support for a proposed African internet governance overhaul, arguing it undermines multistakeholder principles and sets a dangerous precedent of political interference in global internet infrastructure. more

AI-Powered Malware Evolves: Google Uncovers Live Use of Generative Models in Active Intrusions

Google's Threat Intelligence Group reveals that hackers are integrating AI models directly into malware, enabling live code mutation, stealthier operations, and dynamic payload execution while exploiting AI tools through deceptive prompts and underground marketplaces. more

Verizon and AWS Expand Network Ties to Meet AI Data Demands

Verizon and AWS have deepened their collaboration to build dedicated fiber infrastructure, addressing the growing need for low-latency, high-capacity connectivity to support the rapid expansion of enterprise-scale artificial intelligence workloads. more

China Tightens Cybersecurity Rules to Curb AI and Infrastructure Threats

China is revising its cybersecurity laws to include faster reporting requirements and stricter oversight of AI-related incidents, reflecting growing concerns about national security and the unchecked expansion of digital infrastructure. more

DNS Under Strain: Technical and Policy Challenges in Supporting the Internet of Autonomous Things

A new IETF draft outlines critical limitations of DNS in supporting the Internet of Autonomous Things, highlighting challenges related to latency, mobility, security, and privacy, and proposing architectural improvements to meet evolving machine-driven demands. more

Starlink Passes 10,000 Satellites, Expanding Global Internet Reach

SpaceX has launched over 10,000 Starlink satellites, solidifying its lead in low-Earth orbit internet infrastructure and accelerating a broader industry shift toward satellite-based broadband in underserved and remote regions worldwide. more

Massive AWS Outage Disrupts Global Internet, Services Restored After DNS Failure

A major Amazon Web Services outage briefly disrupted millions of websites, apps, and smart devices worldwide. The DNS-related failure exposed the internet's heavy dependence on a few cloud providers before full recovery was achieved. more

Microsoft Warns Extortion Drives Majority of Attacks Amid AI Escalation, Identity Collapse, and Global Fragmentation

Microsoft's latest Digital Defense Report reveals how cybercriminals and nation-states are rapidly adopting AI to enhance attacks. With identity-based threats soaring, the company urges urgent modernization of security systems and global cooperation. more

New Paper Proposes ‘Attested DNS’ to Secure Domain Names with Trusted Hardware

Azure researchers propose attested DNS, a system that embeds confidential computing into the internet's naming infrastructure. By binding domain names to trusted hardware and software, it enhances service verification while maintaining compatibility with existing web technologies. more

Cloudflare Challenges Google’s AI Dominance With New Web Content Policy

Cloudflare's new policy challenges Google's AI practices, giving website owners legal tools to control how their content is scraped, used, and monetised by AI systems. more

U.S. Senators Push for Federal Oversight of Advanced AI Systems

Senators Hawley and Blumenthal propose a bipartisan bill requiring federal evaluation of advanced AI systems, aiming to prevent misuse while balancing national security, civil liberties, and technological competitiveness. more

Hyper-Volumetric DDoS Attack Sets New Benchmark at 22.2 Tbps

A record-shattering DDoS attack peaking at 22.2 Tbps signals a new era of cyber aggression, driven by weaponized IoT botnets and raising urgent questions about global internet resilience. more

Stargate Expands: OpenAI and Partners Unveil Massive AI Infrastructure Push Across the U.S.

OpenAI, Oracle, and SoftBank have announced five new data centers as part of their $500 billion Stargate initiative. This privately funded project aims to expand AI infrastructure across the United States. more

Com Laude Acquires Markmonitor in $450M Deal

London-based Com Laude, owned by PX3 Partners, will acquire Markmonitor from Newfold Digital for $450 million, merging two long-established firms in the corporate domain management sector. more

European Airports Still Reeling from Ransomware Attack as Software Fix Nears

European air travel remains disrupted today following a ransomware attack on Friday that crippled automated check-in and boarding systems across several major airports. The culprit appears to be malicious code targeting Muse, a system developed by Collins Aerospace, a subsidiary of RTX, which provides critical software to airlines. more

14th Registration Operations Workshop Set for September 30, 2025

The Registration Operations Workshop (ROW), an informal gathering of DNS professionals, is set to continue its tradition of fostering technical dialogue and knowledge-sharing across the domain name ecosystem. more

Study Finds IPv6 Adoption Exposes More Residential Devices to Unsolicited Traffic

As IPv6 adoption accelerates, a new study warns that the disappearance of NAT in home networks is exposing millions of devices to online threats -- potentially fueling a new wave of powerful IoT botnets. more

Most Read – Last 30 Days

Recent Comments

Limiting Large Network Outages

Topics

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

NordVPN Promotion

Industry Updates

A New DNS Validation Method for Simplified Certificate Automation

DigiCert A new DNS-based domain validation method promises to streamline certificate automation by reducing DNS write requirements, improving operational security, and aligning with broader industry moves toward scalable, standards-based certificate management. more

Hard Data on DDoS, DNS, and the Race for Resilience

DigiCert As online attacks grow in complexity and scale, DigiCert's RADAR Brief reveals why resilience across DNS, DDoS, and automation is emerging as the defining metric of digital trust in a hyperconnected economy. more

Going DNS Deep Diving Into GhostCall and GhostHire

WhoisXML API A DNS investigation into GhostCall and GhostHire uncovers how BlueNoroff targeted tech leaders and Web3 developers, exposing extensive data theft and a wide malicious infrastructure that included suspicious domains, weaponized IP addresses, and typosquatted assets. more

.store and MrBeast Campaign Surpasses 500 Million Views Across Platforms

Radix Radix's .store domain has soared past 500 million views across platforms through its high-profile collaboration with MrBeast, underscoring the power of strategic digital branding and creator-led commerce in the online economy. more

COLDRIVER’s MAYBEROBOT in the DNS Spotlight

WhoisXML API Russia-linked threat actor COLDRIVER has revamped its malware into a new backdoor called MAYBEROBOT, targeting NGOs and dissidents. Early DNS signals and IP resolutions reveal a methodically evolving cyber-espionage campaign. more

IPv4 Address Prices Continue Their Descent, But Demand Remains Resilient

IPv4.Global IPv4 address prices continued to decline through October 2025, particularly for larger blocks, as increased supply meets steady demand in a maturing market marked by strategic sales and competitive pricing. more

Burrowing Into the Beamglea Campaign DNS Infrastructure

WhoisXML API A threat campaign known as Beamglea exploited npm packages to target over 135 companies globally. Researchers uncovered 175 malicious packages, 344 related domains, and dozens of IP-linked artifacts through DNS and WHOIS analysis. more

Chasing After RacoonO365 IoCs Using DNS and Domain Intelligence

WhoisXML API A coordinated crackdown on RaccoonO365 reveals the scale of phishing-as-a-service operations, as domain and DNS data expose hundreds of linked artifacts and offer a window into the infrastructure of low-skill cybercrime. more

Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive

WhoisXML API Cybercriminals are swapping standard image formats for SVG files to smuggle malware into systems. A detailed investigation uncovered a sprawling network of suspicious domains, IP addresses, and email-linked infrastructure used for espionage and cryptojacking. more

2025 .US Town Hall Registration Open: Explore Industry Trends & Policy Insights

GoDaddy Registry The 2025 .US Virtual Town Hall opens registration for a timely dialogue on domain policy, security, and digital inclusion. Experts and community members will explore how America's online identity is evolving in a shifting landscape. more

Industry Guides

Dedicated IP VPN: Complete Guide, Benefits, Setup & More

What is a Dedicated IP VPN? A Dedicated IP VPN is a Virtual Private Network (VPN) service that provides users with a unique, static IP address assigned exclusively to them. Unlike a shared IP address, which is used by multiple users simultaneously, a dedicated IP is reserved for a single user, offering greater control and security over their online activities. more

Starlink Internet Service (2024 Review)

Starlink provides high-speed, low-latency satellite internet, making it ideal for rural and remote areas lacking traditional broadband. Installation is user-friendly, and coverage continues to expand globally. However, the service is relatively expensive, and performance can be impacted by adverse weather. Overall, Starlink is a reliable choice for those without access to conventional internet options. more

Can ISPs See My VPN? (All You Need to Know)

ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more

What is Satellite Internet? (Complete Guide, Costs, Providers, and More)

Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more

Does NordVPN Still Work With Netflix? How to Use It and Fix It If Not Working

Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more

How to Get NordVPN Free Trial (Risk-Free Options for 2024)

NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more

NordVPN Review 2024: Is It Fast, Secure, and Worth It?

NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more

Best VPN Countries for Privacy, Speed, and Streaming (2024)

The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more

Why Are VPNs Important for Remote Work?

VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more

How Does a VPN Protect You?

A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more