Google's lawsuit against the Lighthouse phishing syndicate exposes the industrial scale of cybercrime, highlighting how criminals exploit easy access to digital infrastructure to scam millions. The broader supply chain enabling such operations demands urgent reform.
Granular regulation offers a new governance framework for AI, blending flexibility with enforceability. By translating broad principles into risk-sensitive, technical mandates, it overcomes the rigidity of rule-based models and the vagueness of principle-based approaches.
Outdated policies at Regional Internet Registries hinder the efficient transfer and leasing of IP addresses, driving up internet costs in emerging markets and limiting innovation. A faster, more inclusive governance model is urgently needed.
The Internet has evolved from a scarcity-driven system into one defined by abundance, reshaping infrastructure, governance, and economic models while challenging long-held assumptions about addressing, network roles, and the future of protocol design.
As multistakeholder governance nears a critical juncture, leaders must navigate diverging views, geopolitical pressures and technological upheaval. With sovereignty concerns mounting, the Internet's institutions face a complex future that demands deft stewardship.
The Internet Society is seeking nominations for its 2026 Board of Trustees. Four seats are open across its global stakeholder communities, offering an opportunity to help steer the future of a trusted, open Internet.
Despite early dismissals from cable giants, consumer demand and real-world use cases proved the value of gigabit broadband. Today, slow uploads and strategic pricing continue to signal an industry reluctant to embrace speed.
Unlike past technological shifts, artificial intelligence is automating high-skilled professions before low-skilled ones. This reversal challenges long-held assumptions about job security, expertise, and governance, forcing policymakers to rethink regulation, trust, and digital sovereignty.
As artificial intelligence integrates into public infrastructure, it introduces new layers of systemic risk. Policymakers must shift focus from AI's potential to its exposure, applying governance models that reflect these emerging, compound vulnerabilities.
As telecom networks grow more interconnected, local outages can now trigger regional or national disruptions. A recent article by Ookla outlines five critical steps operators must follow to prevent small faults from cascading into systemic failures.
To prepare DNS security for a post-quantum future, Verisign and partners are testing new cryptographic strategies that balance security, performance, and feasibility, especially through the novel Merkle Tree Ladder mode for managing large signatures.
With IPv4 addresses fetching up to $30 apiece and IPv6 adoption lagging, companies may be sitting on hidden digital assets. A strategic audit could unlock unexpected revenue and enhance long-term infrastructure planning.
DOTZON's 2025 study analyzes over 410 corporate dotBrands to reveal how companies strengthen digital identities through custom top-level domains. Audi retains first place, while newcomers like CRS and rising performers such as Schwarz demonstrate growing strategic use.
Artificial intelligence is transforming Africa's informal economy by improving access to finance, optimizing business operations, and helping small-scale entrepreneurs transition into the formal sector, despite challenges such as digital illiteracy and infrastructure gaps.
As AI notetakers become common in virtual meetings, concerns grow over data privacy, potential misuse, and the risks of unknowingly sharing sensitive corporate information with unseen third parties beyond organizational control.
Most households experience poor WiFi performance, yet ISPs routinely overlook in-home coverage gaps. A new survey reveals that customers increasingly conflate WiFi with broadband itself, and many are willing to switch providers for better service.
While Starlink dominates the low-Earth orbit internet race, rivals like OneWeb, Telesat, Amazon's Project Kuiper, and Europe's IRIS² are slowly building capacity, buoyed by geopolitical necessity, state support, and commercial partnerships.
eco's topDNS initiative and AV-Test are publishing monthly reports to help ISPs detect and mitigate DNS abuse by analysing malware, phishing, and PUA trends, creating a long-term data foundation for industry-wide transparency.
Despite offering robust protection for the Domain Name System, DNSSEC suffers from poor adoption due to its complexity, cost, and operational risks. Automation and algorithmic improvements now offer practical solutions for broader deployment.
Diverging policies and fee structures among Regional Internet Registries are reshaping the global IPv4 market. RIPE has emerged as a liquidity hub, while others leak resources, risking long-term instability and financial fragility.
A Chinese-linked cyberattack exploited Anthropic's Claude AI to infiltrate global institutions with limited human input, prompting urgent calls for regulation and sparking debate over the growing autonomy of artificial intelligence in digital threats. more
AI Boom Spurs Record Investment in Undersea Cables Amid Geopolitical and Security Concerns
As AI accelerates global data demand, tech giants are investing heavily in subsea cables. These critical networks face rising geopolitical scrutiny and security risks, reshaping the future of digital infrastructure and global connectivity. more
Alice Munyua criticises ICANN's support for a proposed African internet governance overhaul, arguing it undermines multistakeholder principles and sets a dangerous precedent of political interference in global internet infrastructure. more
Google's Threat Intelligence Group reveals that hackers are integrating AI models directly into malware, enabling live code mutation, stealthier operations, and dynamic payload execution while exploiting AI tools through deceptive prompts and underground marketplaces. more
Verizon and AWS Expand Network Ties to Meet AI Data Demands
Verizon and AWS have deepened their collaboration to build dedicated fiber infrastructure, addressing the growing need for low-latency, high-capacity connectivity to support the rapid expansion of enterprise-scale artificial intelligence workloads. more
China is revising its cybersecurity laws to include faster reporting requirements and stricter oversight of AI-related incidents, reflecting growing concerns about national security and the unchecked expansion of digital infrastructure. more
A new IETF draft outlines critical limitations of DNS in supporting the Internet of Autonomous Things, highlighting challenges related to latency, mobility, security, and privacy, and proposing architectural improvements to meet evolving machine-driven demands. more
Starlink Passes 10,000 Satellites, Expanding Global Internet Reach
SpaceX has launched over 10,000 Starlink satellites, solidifying its lead in low-Earth orbit internet infrastructure and accelerating a broader industry shift toward satellite-based broadband in underserved and remote regions worldwide. more
Massive AWS Outage Disrupts Global Internet, Services Restored After DNS Failure
A major Amazon Web Services outage briefly disrupted millions of websites, apps, and smart devices worldwide. The DNS-related failure exposed the internet's heavy dependence on a few cloud providers before full recovery was achieved. more
Microsoft Warns Extortion Drives Majority of Attacks Amid AI Escalation, Identity Collapse, and Global Fragmentation
Microsoft's latest Digital Defense Report reveals how cybercriminals and nation-states are rapidly adopting AI to enhance attacks. With identity-based threats soaring, the company urges urgent modernization of security systems and global cooperation. more
Azure researchers propose attested DNS, a system that embeds confidential computing into the internet's naming infrastructure. By binding domain names to trusted hardware and software, it enhances service verification while maintaining compatibility with existing web technologies. more
Cloudflare's new policy challenges Google's AI practices, giving website owners legal tools to control how their content is scraped, used, and monetised by AI systems. more
Senators Hawley and Blumenthal propose a bipartisan bill requiring federal evaluation of advanced AI systems, aiming to prevent misuse while balancing national security, civil liberties, and technological competitiveness. more
Hyper-Volumetric DDoS Attack Sets New Benchmark at 22.2 Tbps
A record-shattering DDoS attack peaking at 22.2 Tbps signals a new era of cyber aggression, driven by weaponized IoT botnets and raising urgent questions about global internet resilience. more
Stargate Expands: OpenAI and Partners Unveil Massive AI Infrastructure Push Across the U.S.
OpenAI, Oracle, and SoftBank have announced five new data centers as part of their $500 billion Stargate initiative. This privately funded project aims to expand AI infrastructure across the United States. more
London-based Com Laude, owned by PX3 Partners, will acquire Markmonitor from Newfold Digital for $450 million, merging two long-established firms in the corporate domain management sector. more
European Airports Still Reeling from Ransomware Attack as Software Fix Nears
European air travel remains disrupted today following a ransomware attack on Friday that crippled automated check-in and boarding systems across several major airports. The culprit appears to be malicious code targeting Muse, a system developed by Collins Aerospace, a subsidiary of RTX, which provides critical software to airlines. more
The Registration Operations Workshop (ROW), an informal gathering of DNS professionals, is set to continue its tradition of fostering technical dialogue and knowledge-sharing across the domain name ecosystem. more
As IPv6 adoption accelerates, a new study warns that the disappearance of NAT in home networks is exposing millions of devices to online threats -- potentially fueling a new wave of powerful IoT botnets. more
Chinese APT Groups Exploit Global Domains in Sweeping Cyber Campaign
A years-long cyberespionage campaign by a Chinese state-sponsored group known as Salt Typhoon has revealed a striking escalation in both scale and technical sophistication. more
Digital Rights Defender Steps Aside: Cindy Cohn to Leave EFF After 25 Years
Cindy Cohn, a leading advocate for digital civil liberties, will step down as executive director of the Electronic Frontier Foundation (EFF) by mid-2026. Her departure marks the end of a tenure spanning over two decades, including ten years at the helm of the San Francisco-based nonprofit. more
After three years of turmoil, AFRINIC - the regional internet registry for Africa - has opened online voting for a new board, marking what could be a turning point for the embattled organisation. The election, running from September 10 to 12, follows a failed attempt earlier this year that was annulled amid allegations of vote manipulation and procedural irregularities. more
JetBlue Selects Amazon’s Project Kuiper for In-Flight Satellite Connectivity
Amazon's satellite-internet project, Project Kuiper, has signed its first commercial airline partner: JetBlue. The budget-friendly airline will start adding Kuiper's satellite terminals to its planes to offer free in-flight Wi-Fi, a feature that now helps airlines stand out in a crowded market. more
Chat Control Proposal Advances Despite Rising Opposition in Europe
Support for the European Union's contentious Chat Control legislation - designed to combat child sexual abuse material (CSAM) - remains strong, yet a rising chorus of opposition now threatens to complicate its path to adoption. more
Advanced AI Is Reshaping the Cybercriminal Landscape at Alarming Speed
A new report has shed light on how advanced artificial intelligence is reshaping the cybercriminal landscape. The latest threat intelligence assessment by Anthropic details how its AI model, Claude, was misused in a string of global cyberattacks that mark a sharp escalation in both scale and sophistication. more
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign
A threat campaign known as Beamglea exploited npm packages to target over 135 companies globally. Researchers uncovered 175 malicious packages, 344 related domains, and dozens of IP-linked artifacts through DNS and WHOIS analysis. more
A coordinated crackdown on RaccoonO365 reveals the scale of phishing-as-a-service operations, as domain and DNS data expose hundreds of linked artifacts and offer a window into the infrastructure of low-skill cybercrime. more
Cybercriminals are swapping standard image formats for SVG files to smuggle malware into systems. A detailed investigation uncovered a sprawling network of suspicious domains, IP addresses, and email-linked infrastructure used for espionage and cryptojacking. more
The 2025 .US Virtual Town Hall opens registration for a timely dialogue on domain policy, security, and digital inclusion. Experts and community members will explore how America's online identity is evolving in a shifting landscape. more
WhoisXML API's Q3 2025 analysis found global new domain registrations dipped 1.2% from Q2, with gTLDs rising and ccTLDs falling sharply. The .cc ccTLD remained an anomaly, and .com led malicious domain activity. more
The Domain Name Industry Brief reports 378.5 million total domain name registrations in Q3 2025, marking a 16.2 million increase year over year and offering detailed insights into top TLD, ccTLD, and gTLD trends. more
IPv4 address prices continued to decline through Q3 2025, yet steady demand and strong supply are keeping the market active. Smaller blocks remain more resilient as larger allocations face sharper pricing pressure. more
A Chinese-language SEO poisoning campaign has been uncovered, leading users to fake software sites. Investigators linked the scheme to malware variants and uncovered thousands of malicious domains, subdomains, and IP addresses through DNS and WHOIS analysis. more
DNS Security Extensions (DNSSEC) offer cryptographic safeguards to validate DNS responses, countering spoofing and cache poisoning. While implementation is complex, best practices and third-party services help firms navigate the operational demands of deployment. more
WhoisXML API has halved the false positive rate of its malicious domain feed, enhancing detection precision. The update refines machine learning models, promising leaner cybersecurity operations and fewer interruptions from erroneous threat alerts. more
What is a Dedicated IP VPN? A Dedicated IP VPN is a Virtual Private Network (VPN) service that provides users with a unique, static IP address assigned exclusively to them. Unlike a shared IP address, which is used by multiple users simultaneously, a dedicated IP is reserved for a single user, offering greater control and security over their online activities. more
Starlink provides high-speed, low-latency satellite internet, making it ideal for rural and remote areas lacking traditional broadband. Installation is user-friendly, and coverage continues to expand globally. However, the service is relatively expensive, and performance can be impacted by adverse weather. Overall, Starlink is a reliable choice for those without access to conventional internet options. more
ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more
Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more
Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more
NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more
NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more
The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more
VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more
A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more