Hot Topics:   Domain Names    Cybersecurity    DNS Security    Policy & Regulation    Broadband    Access Providers    Whois   

Featured Blogs

Phishers Exploit the Cybercrime Supply Chain Despite the Availability of Effective Countermeasures

Karen Rose Interisle Consulting Group today released its fourth annual Phishing Landscape report investigating where and how cybercriminals acquire naming and hosting resources for phishing. Our study shows that cybercriminals evolved their tactics for obtaining attack resources, including sharply increasing their exploitation of subdomain and gateway providers. more

An Unnatural .Bond: A Study of a ‘Megacluster’ of Malware Domains

David Barnett A recent news story, following research from security provider Infoblox, highlighted the case of the 'Revolver Rabbit' cybercriminal gang, who have registered more than half-a-million domains to be used for the distribution of information-stealing malware. The gang make use of automated algorithms to register their domains, but unlike the long, pseudo-random ('high entropy') domain names frequently associated with such tools, the Revolver Rabbit domains instead tend to consist of hyphen-separated dictionary words (presumably so as to obfuscate their true purpose), with a string of digits at the end. more

The Future of AI in Broadband: Impacts on Network Demand and Power Consumption

Doug Dawson AI technology seems to be a hot topic in every industry, and broadband is no exception. It seems inevitable that AI will be used to help monitor and control complex broadband networks. It looks like the biggest ISPs are already phasing AI into the customer service process. Nobody seems to be able to answer the big question of whether AI will change the amount of broadband the average household uses. more

Analysis of the Global IT Breakdown Caused by Microsoft-CrowdStrike

Paul Budde The Optus outage in Australia from last year was immediately on my mind when on Friday afternoon a similar event swept, this time, across the world. Also, in this case it was a software update that caused the problem. This time from global security software provider CrowdStrike. The culprit appears to be an update to the CrowdStrike Falcon platform, a security monitoring tool widely deployed by businesses and organisations on Microsoft desktop computers and notebooks. more

Rethinking Digital Sovereignty: The Pitfalls of an Infrastructured Approach

Imad Payande In an era where our lives are increasingly intertwined with digital technologies, a recent development in the realm of digital sovereignty has sparked a pressing concern for nations and individuals alike. The concept of digital self-determination, once hailed as a great equalizer, has become a battleground for power, privacy, and control, with governments and tech giants vying for dominance in the digital realm. more

Geely Geespace Update - Global Centimeter-Level Positioning Services

Larry Press Chinese automobile conglomerate Geely has made significant strides since I last wrote about their Geesat LEO constellation for mobile vehicle connectivity. They launched the first nine satellites in June 2022 and a second batch of eleven satellites in February 2024. The mass of the first nine satellites was 100 kg, and the mass of the second eleven was 130 kg, so they are not identical. more

Loving and Hating Starlink

Doug Dawson I'm such an industry nerd that I sometimes read customer reviews of large ISPs just to see how the public perceives them. Most ISPs have more negative reviews than positive ones, and that's to be expected since people are more likely to complain when things go wrong than give praise when things are working as promised. more

Net Neutrality: What Is Old Is New Again

Steve Rosen On July 22, the FCC's open Internet order - which transforms Internet access service from a lightly regulated information service into a heavily regulated telecommunications service - will take effect. This article describes the policies and legal theories underlying the Order and the Order's effect on consumers of Internet services and providers of the service, including a number of entities that had previously escaped FCC regulation. more

Global Domain Market: 368 Million Names and Growth in 2023 (Afnic Observatory)

Loic Damilaville Afnic, the association in charge of the .fr domain and several other French overseas and generic Top Level Domains, has published the 2023 edition of its annual observatory report "The global domain name market" containing all of the latest key figures and trends in the TLD market... At year-end 2023, the global domain name market represented some 368 million domain names. more

Will We Ever End Legacy Telephone Networks?

Doug Dawson Anybody not involved in the telephone business will probably be surprised to find that the old TDM telephone networks are still very much alive and in place. The old technologies were supposed to be phased out and replaced by digital technologies. The FCC started talking about this before 2010. In 2013, Tom Wheeler, the FCC Chairman at the time, announced an effort to force the needed changes, which was dubbed the IP Transition. more

The Evolution of DNS: Adapting to the Changing Internet Landscape

Geoff Huston The DNS is a crucial part of today's Internet. With the fracturing of the network's address space as a byproduct of IPv4 address run down and the protracted IPv6 transition the Internet's name space is now the defining attribute of the Internet that makes it one network. However, the DNS is not a rigid and unchanging technology. It has changed considerably over the lifetime of the Internet and here I'd like to look at what's changed and what's remained the same. more

‘Internet Fragmentation’: A Defining Challenge for Digital Technology Governance?

Michaela Nakayama Shapiro At the recent Internet Corporation for Assigned Names and Numbers (ICANN) 80 Policy Forum meeting, one notable takeaway was its close focus on questions around the stability and security of the technical layer of the Internet: the growing risks which assail it, and potential ways to address these through governance. more

A Mature Broadband Market? (Implications and Industry Shifts)

Doug Dawson It is becoming clear that the broadband market is reaching maturity. This is already causing havoc in the industry for ISPs that relied on year-over-year customer growth to prop up stock prices. Earlier this year, the New Street Research, a company that specializes in research in the telecommunications and technology sectors, said that it estimated that new broadband customers would grow by about 1 million this year. more

When a UDRP Panel Infers Bad Faith from An Asking Price

Nat Cohen In the dispute, a three-member UDRP panel unanimously ordered the transfer of the disputed domain name to the Complainants, All Star C.V. and Converse, Inc., owners of the well-known brand CONVERSE for shoes and apparel. The panel drew the inference that the Respondent, by setting of an asking price of around $300,000 after having acquired the domain name for $306, was primarily motivated by a bad faith intent to target the Complaint. more

Alternative Insights on Article 28 of the NIS2 Directive

Dean Marks On June 9 CircleID published an insightful article by Thomas Rickert entitled "Demystifying Art 28 NIS2." In that piece Thomas set forth two alternative interpretations of Article 28(6) of NIS2, and argued that TLD registries should not be required to maintain a separate database of the registrant data under NIS2. In my view, Thomas' approach is inconsistent with the remainder of Article 28, and would not achieve the goals of NIS2 to improve cybersecurity across the EU member states. more

News Briefs

Bangladesh Faces Total Internet Shutdown Amid Violent Student Protests

Bangladesh is experiencing a complete internet shutdown and severe mobile service disruptions due to escalating student protests that began earlier this week. more

Google to Deactivate URL Shortener, Sparking Concerns Over ‘Link Rot’

Google has announced it will fully deactivate its URL shortening service,, by August 25, 2025, prompting concerns about widespread "link rot." Starting next month, links will display a warning message before ceasing to work altogether by the 2025 deadline. more

Global IT Outage Disrupts Airlines, Businesses, and Hospitals

A massive IT glitch originating from a software update by cybersecurity firm CrowdStrike has caused significant disruptions worldwide, impacting airlines, businesses, medical facilities, and broadcasters. The issue, identified as a faulty update in Microsoft cloud services, led to widespread outages early Friday. more

Damaged Internet Subsea Cables Repaired in Red Sea Amid Militant Attacks on Ships

Repairs on three crucial subsea telecommunications cables in the Red Sea, damaged since February, have begun despite ongoing militant attacks. The AAE–1 cable, a significant 25,000-kilometer fiber optic link between Asia and Europe, was repaired by E-Marine. more

Kaspersky Lab to Shut Down U.S. Operations Amid Federal Ban

Russian cybersecurity firm Kaspersky Lab has announced the closure of its U.S. division, resulting in layoffs for its U.S.-based employees. The decision follows a recent U.S. Commerce Department ban on the sale of Kaspersky software, effective from July 20, due to national security concerns. more

Senators Introduce COPIED Act to Combat AI-Driven Deepfakes

In a bipartisan effort to address the growing threat of deepfakes, U.S. Senators Marsha Blackburn (R-Tenn.), Maria Cantwell (D-Wash.), and Martin Heinrich (D-N.M.) have introduced the Content Origin Protection and Integrity from Edited and Deepfaked Media Act (COPIED Act). more

Security Lapses Lead to Squarespace Domain Hijacks

At least a dozen organizations experienced domain hijacks through the domain registrar Squarespace last week. The incidents, occurring between July 9 and July 12, primarily affected cryptocurrency businesses such as Celer Network, Compound Finance, Pendle Finance, and Unstoppable Domains. more

South Korean Telecom Giant KT Corporation Accused of Infecting 600,000 Users with Malware Over Torrent Use

South Korean telecom giant KT Corporation has been implicated in deliberately infecting over 600,000 users with malware due to their use of torrent services, as reported by JTBC. more

Biden Administration Probes Chinese Telecom Firms Over U.S. Data Security Concerns

The Biden administration is investigating China Mobile, China Telecom, and China Unicom over concerns that these companies could potentially exploit their access to U.S. data through their cloud and internet services, potentially sharing this data with the Chinese government. more

Biden Administration Bans Kaspersky Software Over National Security Concerns

The Biden administration is set to prohibit the sale of Kaspersky Lab's antivirus software in the U.S., citing national security risks due to the company's ties to the Russian government. more

French Court Orders Google, Cloudflare, Cisco to Poison DNS in Anti-Piracy Crackdown

In a significant escalation against piracy, a French court has ordered Google, Cloudflare, and Cisco to tamper with their DNS resolvers to block access to approximately 117 pirate sports streaming domains. more

ICANN Announces Kurt Erik Lindqvist as New President and CEO

The Internet Corporation for Assigned Names and Numbers (ICANN) has appointed Kurt Erik "Kurtis" Lindqvist as its new President and CEO, effective December 5, 2024. Lindqvist, an industry veteran with over 30 years of experience in the development of Internet Service Providers and global network carriers, currently serves as the CEO of the London Internet Exchange (LINX). more

Canadian Bill S-210 Sparks Controversy Over Internet Regulations

A new bill in the Canadian Senate, Bill S-210, has ignited a heated debate over its potential impact on the Internet in Canada. The bill, which mandates strict age verification for online content, has raised significant concerns among privacy advocates, network operators, and digital rights groups. more

Mystery Malware Takes Down 600,000 Windstream Routers in Coordinated Attack

In late October, subscribers of Windstream's Kinetic broadband service reported widespread router failures, affecting approximately 600,000 devices across 18 states. Users flooded online forums with complaints, noting their ActionTec T3200 routers displayed a persistent red light and were unresponsive to resets. more

Internet’s 50th Anniversary Celebrated Worldwide with IEEE Event

On May 19, 2024, the Internet's 50th anniversary was celebrated in a virtual event named i50, drawing participation from 1,000 IEEE members and internet enthusiasts from 56 countries. The live-streamed event was a highlight in a series of celebrations marking this milestone. more

Unexplained Glitch Disrupts Root-Server, Raises Security Concerns

For over four days, a crucial server within the Internet's domain name system (DNS) experienced an unexplained glitch, causing it to fall out of sync with its 12 peer root servers. The server, operated by Cogent Communications, is one of the 13 essential root servers that manage the Internet's root zone. more

Researchers Expose Privacy Risks in Apple and Starlink’s Geo-Location Data, Uncovering Military and Civilian Tracking

Researchers from the University of Maryland have revealed significant privacy and security concerns related to the way Apple and Starlink geo-locate devices. Their study found that Apple's Wi-Fi Positioning System (WPS) collects and publicly shares precise locations of Wi-Fi access points. more

Yemen’s Submarine Cable Repairs Hindered by Political Dispute

Repair efforts for three crucial submarine internet cables damaged in the Red Sea are being obstructed by political disputes over access to Yemeni waters. more

UK First Country to Implement Cybersecurity Laws for Smart Devices, Including Banning Easily Guessable Default Passwords

Today UK's new consumer protection laws against hacking and cyber-attacks officially take effect. This legislation, a global first, mandates that all internet-connected smart devices - from smartphones and game consoles to connected refrigerators - meet stringent security standards. more

Proposed Generative AI Disclosure Act Seeks Transparency and Fairness in AI Training Datasets

In response to ongoing controversies over the use of copyrighted content in training artificial intelligence, U.S. Representative Adam Schiff has introduced the Generative AI Disclosure Act more

Most Read – Last 30 Days

Recent Comments

The UN's AI Leadership


Threat Intelligence

Sponsored byWhoisXML API


Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC



IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Industry Updates

Uncovering DNS Details on Operation Celestial Force

WhoisXML API Advanced persistent threat (APT) groups will employ any means necessary to compromise the networks of their intended targets. And for Cosmic Leopard, that means using GravityRAT, an Android-based malware, and HeavyLift, a Windows-based malware loader, in their most recent operation Cisco Talos has dubbed "Operation Celestial Force." more

Global DNS and Domain Activity Trends in Q2 2024

WhoisXML API Our research team analyzed more than 21.5 million domains registered between 1 April and 30 June 2024, as seen in the Newly Registered Domains (NRDs) Data Feed. more

On the Hunt for Remnants of the Samourai Wallet Crypto Mixing Services in the DNS

WhoisXML API Keonne Rodriguez and William Lonergan Hill, founders of Samourai Wallet, a cryptocurrency mixing service, were sentenced in April 2024 and their sites taken down for executing more than US$2 billion in unlawful transactions and laundering more than US$100 million in criminal proceeds. more

A Peek at the V3B Phishing Kit Attack via the DNS Lens

WhoisXML API Phishing is and remains a top threat. Google alone blocks around 100 million phishing emails daily, and it doesn't help that phishers get extra help from phishing kits -- ready-made cybercrime tools that allow even cybercriminal newbies to launch attacks following a few simple steps. more

NIS2 and Its Implications for Global Brands

CSC Last month, Stephanie Driver, CSC's marketing manager, spoke with Global Director of Security Services Mark Flegg and discussed the Network and Information Security Directive (NIS2) 2022, which comes into force in October 2024. more

Tracking Down Fake Cryptocurrency Sellers Using DNS Intelligence

WhoisXML API Threat researcher Dancho Danchev recently uncovered 130 domains that seemingly belong to fake cryptocurrency sellers. The WhoisXML API research team sought to find potential connections to the threat by expanding the current list of indicators of compromise (IoCs) using our vast array of DNS intelligence sources. more

Following the DNS Trail of APT Group Newbie Unfading Sea Haze

WhoisXML API A new advanced persistent threat (APT) group dubbed "Unfading Sea Haze" has been trailing its sights on various organizations based in countries surrounding the South China Sea. more

On the DNS Trail of the Foxit PDF Bug Exploitation Attackers

WhoisXML API Check Point Research reported a Foxit PDF Reader vulnerability that threat actors have begun exploiting, putting the application's users at risk. When exploited, the bug triggers security warnings that may deceive unsuspecting users into executing harmful commands. more

Profiling a Popular DDoS Booter Service’s Ecosystem

WhoisXML API Cybercriminals can launch distributed denial-of-service (DDoS) attacks with relative ease these days by using DDoS booter services, online services that automate the DDoS attack process. more

IPv4.Global Commits to Keep Ukraine Connected

IPv4.Global IPv4.Global, the world's largest, most-trusted and transparent IPv4 marketplace, today announced it is a founding member and sponsor of NOGUA's (Network Operators Group of Ukraine) first conference in Lviv, Ukraine, June 3-6, 2024. more

A DNS Investigation of the Phobos Ransomware 8Base Attack

WhoisXML API Intel-Ops researchers recently discovered that the 8Base Ransomware Group has been using Phobos ransomware to infect their targets' networks. 8Base has reportedly been active since mid-2023. more

Stately Taurus APT Group Targets Asian Countries: What Do the Campaign IoCs Reveal?

WhoisXML API A decade-old advanced persistent threat (APT) group called "Stately Taurus," also known as "Mustang Panda" and "Earth Preta," was recently observed targeting Association of Southeast Asian Nations (ASEAN) countries in cyberespionage activities. Specifically, Palo Alto Networks observed two malware packages that may have been used to target Japan, Myanmar, the Philippines, and Singapore. more

Managing Expanding Attack Surfaces for Growing Businesses

Attaxion While 20% of businesses may not survive past their first year, those that manage steady growth face new challenges over time. Among them is external attack surface expansion, one of the most critical security aspects for growing businesses. more

Subdomain Hijacking in the News Again - What is It?

CSC In recent news, more than 13,000 subdomains of brands were hijacked for a large spam campaign that "leverages the trust associated with these domains to circulate spam and malicious phishing emails by the millions each day, cunningly using their credibility and stolen resources to slip past security measures." more