<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-08T19:45:00+00:00</dc:date>

	
	<item>
		<title> Domains Under the Most-Abused TLDs: Same Old DNS Abuse Trends? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20230227-domains-under-the-most-abused-tlds-same-old-dns-abuse-trends</guid>
		<link>https://circleid.com/posts20230227-domains-under-the-most-abused-tlds-same-old-dns-abuse-trends</link>
		<description><![CDATA[While threat actors can use any domain across thousands of top-level domains (TLDs), they often have favorites. For instance, you may be familiar with Spamhaus's 10 most-abused TLDs for spamming. WhoisXML API researchers recently built on this list by analyzing 40,000 newly registered domains (NRDs) that sported some of the listed unreputable TLDs. We called this study "DNS Abuse Trends: Dissecting the Domains Under the Most-Abused TLDs." <a href="https://circleid.com/posts20230227-domains-under-the-most-abused-tlds-same-old-dns-abuse-trends">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> A Three-Step Process to Chase Compulsive Domain Brand Squatters (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20211101-a-three-step-process-to-chase-compulsive-domain-brand-squatters</guid>
		<link>https://circleid.com/posts20211101-a-three-step-process-to-chase-compulsive-domain-brand-squatters</link>
		<description><![CDATA[Domain brand squatting can be defined as the unauthorized or dishonest use of a brand or company identifiers in domain names. It is often linked to the use of look-alike domains in bad faith, and we see it all the time. The threat actors behind these domains are called different names, though a prevalent one would be “typosquatters.” The Hot on the Trail of Compulsive Brand Squatters webinar showcased how these people are infiltrating the Internet. The first page of PhishTank’s valid phish search alone as of this writing tells us that domain brand squatting is a real and present danger. <a href="https://circleid.com/posts20211101-a-three-step-process-to-chase-compulsive-domain-brand-squatters">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> The Risk of Descriptive Subdomains: Are We Revealing Too Much? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210531-the-risk-of-descriptive-subdomains-are-we-revealing-too-much</guid>
		<link>https://circleid.com/posts20210531-the-risk-of-descriptive-subdomains-are-we-revealing-too-much</link>
		<description><![CDATA[Subdomains help organizations sort different sections of their websites neatly. Looking at the subdomains of some websites, for example, we usually see subdomains like shop[.]domain[.]com and blog[.]domain[.]com, which help users navigate the sites efficiently. But we couldn't help but notice subdomains that might be revealing a lot about a company's Internet infrastructure and resources. <a href="https://circleid.com/posts20210531-the-risk-of-descriptive-subdomains-are-we-revealing-too-much">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Could Bulk-Registered Typosquatting Domains Be Connected to .ORG DNS Abuse? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210419-could-bulk-registered-typosquatting-domains-dot-org-dns-abuse</guid>
		<link>https://circleid.com/posts20210419-could-bulk-registered-typosquatting-domains-dot-org-dns-abuse</link>
		<description><![CDATA[Public Interest Registry (PIR) announced the creation of the DNS Abuse Institute about two months ago as it believes that "every .ORG makes the world a better place" and "anything that gets in the way of that is a threat," notably in the form of Domain Name System (DNS) abuse. To show support for the initiative, WhoisXML API analyzed monthly typosquatting data feeds for December 2020, January 2021, and February 2021 to identify .ORG domain trends... <a href="https://circleid.com/posts20210419-could-bulk-registered-typosquatting-domains-dot-org-dns-abuse">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> What Are the Connections to Identified Hafnium Malicious IP Addresses? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210416-what-are-connections-to-identified-hafnium-malicious-ip-addresses</guid>
		<link>https://circleid.com/posts20210416-what-are-connections-to-identified-hafnium-malicious-ip-addresses</link>
		<description><![CDATA[Cyber attackers are very skilled at infiltration. They'd find ways into a house through cracks and holes that the homeowner doesn't know about. Analogically speaking, that's what the new cyber attack group dubbed "Hafnium" did when they identified several zero-day Microsoft Exchange vulnerabilities to get into target networks. With thousands of users for every Microsoft Exchange server, the attack has far-reaching implications. First, it establishes the presence of a new threat actor group in town. What else could they be up to? <a href="https://circleid.com/posts20210416-what-are-connections-to-identified-hafnium-malicious-ip-addresses">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> WHOIS Record Redaction and GDPR: What's the Evolution Post-2018? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210119-whois-record-redaction-and-gdpr-whats-the-evolution-post-2018</guid>
		<link>https://circleid.com/posts20210119-whois-record-redaction-and-gdpr-whats-the-evolution-post-2018</link>
		<description><![CDATA[We all use the Internet daily. Practically every element of our reality has its equal in the virtual realm. Friends turn into social media contacts, retail establishments to e-commerce shops, and so on. We can't deny that the way the Internet was designed, to what it has become, differs much. One example that we'll tackle in this post is the seeming loss of connection between domains and their distinguishable owners. <a href="https://circleid.com/posts20210119-whois-record-redaction-and-gdpr-whats-the-evolution-post-2018">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> What Are the Connected Assets of Confirmed Fake FBI Domains? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210105-what-are-the-connected-assets-of-confirmed-fake-fbi-domains</guid>
		<link>https://circleid.com/posts20210105-what-are-the-connected-assets-of-confirmed-fake-fbi-domains</link>
		<description><![CDATA[Two months ago, the Federal Bureau of Investigation (FBI) alerted the public to a list of domains that could easily be mistaken to be part of its network. The list of artifacts contained a total of 92 domain names, 78 of which led to potentially malicious websites, while the remaining 14 have yet to be activated or are no longer active as of 23 November 2020. <a href="https://circleid.com/posts20210105-what-are-the-connected-assets-of-confirmed-fake-fbi-domains">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> An Investigative Analysis of the Silent Librarian IoCs (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20201112-an-investigative-analysis-of-the-silent-librarian-iocs</guid>
		<link>https://circleid.com/posts20201112-an-investigative-analysis-of-the-silent-librarian-iocs</link>
		<description><![CDATA[The Silent Librarian advanced persistent threat (APT) actors have been detected once again, as the academic year started in September. With online classes increasingly becoming the norm, the group's phishing campaigns that aim to steal research data and intellectual property could have a high success rate. Dozens of phishing domain names have been reported, although some may have already been taken down. <a href="https://circleid.com/posts20201112-an-investigative-analysis-of-the-silent-librarian-iocs">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> A Brief Look at the Domain Attack Surface of Streaming Media Companies (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20201029-a-look-at-domain-attack-surface-of-streaming-media-companies</guid>
		<link>https://circleid.com/posts20201029-a-look-at-domain-attack-surface-of-streaming-media-companies</link>
		<description><![CDATA[The term "attack surface" is often heard in cybersecurity conversations. It refers to the sum of all possible attack vectors or the vulnerabilities that threat actors can exploit to penetrate a target network or damage an organization somehow. An unused and forgotten subdomain, for instance, can become an attack vector when taken over. Certain categories of companies have very large attack surfaces. Such is the case of streaming media businesses like Netflix and HBO Max. <a href="https://circleid.com/posts20201029-a-look-at-domain-attack-surface-of-streaming-media-companies">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Hundreds of "George Floyd" and "Black Lives Matter" Domain Names Appear in the DNS (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20200614-hundreds-of-george-floyd-black-lives-matter-domains-appear-in-dns</guid>
		<link>https://circleid.com/posts20200614-hundreds-of-george-floyd-black-lives-matter-domains-appear-in-dns</link>
		<description><![CDATA[Trending news and global events impact domain registration behaviors. We observed a slew of coronavirus-themed domain name registrations, for example, as early as January. George Floyd's death, which sparked several Black Lives Matter movements, is no different. Three days after George Floyd died, our data feed started detecting George Floyd-themed domain names... We retrieved all domain names that contain the strings "eorge," and "lackliv" from 28 May to 7 June and found 402. <a href="https://circleid.com/posts20200614-hundreds-of-george-floyd-black-lives-matter-domains-appear-in-dns">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Collaboration: A Means to Boost Enterprise Network Protection (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20190919_collaboration_a_means_to_boost_enterprise_network_protection</guid>
		<link>https://circleid.com/posts20190919_collaboration_a_means_to_boost_enterprise_network_protection</link>
		<description><![CDATA[In an age where cyber threats and attacks have reached a point of ubiquity, managing your organization's network security single-handedly may no longer be sufficient. The increasing volume and sophistication of threats, not to mention the continuous advancement in attack tools and their perpetrators' skills and know-how, has led to concerns on whether potential targets can keep up. <a href="https://circleid.com/posts20190919_collaboration_a_means_to_boost_enterprise_network_protection">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> How Domain Data Helps Thwart BEC Fraud (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20190904_how_domain_data_helps_thwart_bec_fraud</guid>
		<link>https://circleid.com/posts20190904_how_domain_data_helps_thwart_bec_fraud</link>
		<description><![CDATA[It's true, domain data has many practical uses that individuals and organizations may or may not know about. But most would likely be interested in how it can help combat cyber threats, which have been identified as the greatest risks businesses will face this year. Dubbed as the greatest bane of most organizations today, cybersecurity can actually be enhanced with the help of domain data. How? <a href="https://circleid.com/posts20190904_how_domain_data_helps_thwart_bec_fraud">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Proactive Cybersecurity: What Small Businesses Can Actually Do (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20190821_proactive_cybersecurity_what_small_businesses_can_actually_do</guid>
		<link>https://circleid.com/posts20190821_proactive_cybersecurity_what_small_businesses_can_actually_do</link>
		<description><![CDATA[In the business world, there are two main paths a company can take with cybersecurity -- the reactive and the proactive approach. The problem with a purely reactive attitude is that it can easily put companies in constant firefighting mode. And for small companies with limited resources, this can turn out to be an increasingly uncomfortable place to be in. 
With that in mind, experts today suggest proactive cybersecurity by monitoring suspicious activity and identifying risks before they turn into full-blown attacks. <a href="https://circleid.com/posts20190821_proactive_cybersecurity_what_small_businesses_can_actually_do">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Threat Intelligence in Latter 2019: Overcoming the Same and New Challenges (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20190819_threat_intelligence_in_2019_overcoming_same_and_new_challenges</guid>
		<link>https://circleid.com/posts20190819_threat_intelligence_in_2019_overcoming_same_and_new_challenges</link>
		<description><![CDATA[Does threat intelligence (TI) work? I looked into that question last year, exploring the reasons why it actually doesn't and what can be done to remediate the situation. Since then, more companies have incorporated TI into their security processes, and many are still not getting the benefits they expect. What's causing the dissatisfaction? Interestingly, pretty much the same aspects... <a href="https://circleid.com/posts20190819_threat_intelligence_in_2019_overcoming_same_and_new_challenges">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	
	<item>
		<title> The Pros and Cons of Introducing New gTLDs (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20190815_the_pros_and_cons_of_introducing_new_gtlds</guid>
		<link>https://circleid.com/posts20190815_the_pros_and_cons_of_introducing_new_gtlds</link>
		<description><![CDATA[Every time new concepts are introduced, much debate ensues as to the advantages and disadvantages such a change would bring forth. We've seen that happen with the launch of IPv6. Detractors and supporters rallied to make their respective arguments heard. One thing is sure though. The need for a much larger IP address space is something both parties are in agreement with. <a href="https://circleid.com/posts20190815_the_pros_and_cons_of_introducing_new_gtlds">More...</a>]]></description>
		<dc:date>2026-04-08T12:45:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>