<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-30T19:14:00+00:00</dc:date>

	
	<item>
		<title> Unearthing DNS Facts about UAT-8099 (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsunearthing-dns-facts-about-uat-8099</guid>
		<link>https://circleid.com/postsunearthing-dns-facts-about-uat-8099</link>
		<description><![CDATA[WhoisXML API analysis deepens understanding of the UAT-8099 campaign, uncovering expanded DNS infrastructure, early indicators of malicious intent, and thousands of linked artifacts, underscoring the group's evolving tactics and regional focus across Asia. <a href="https://circleid.com/postsunearthing-dns-facts-about-uat-8099">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> ForceMemo in the DNS Spotlight (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsforcememo-in-the-dns-spotlight</guid>
		<link>https://circleid.com/postsforcememo-in-the-dns-spotlight</link>
		<description><![CDATA[Researchers tracing the ForceMemo campaign uncover a sprawling DNS footprint, linking compromised GitHub repositories to suspicious domains, shared infrastructure and fresh artifacts, suggesting a coordinated operation that continues to evolve despite partial attribution. <a href="https://circleid.com/postsforcememo-in-the-dns-spotlight">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> DNS Analysis of the Keenadu Backdoor Network (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsdns-analysis-of-the-keenadu-backdoor-network</guid>
		<link>https://circleid.com/postsdns-analysis-of-the-keenadu-backdoor-network</link>
		<description><![CDATA[Keenadu backdoor embedded in Android firmware exploits supply chains and OTA updates, while DNS analysis of its infrastructure reveals coordinated domains, IP links, and early warning signals pointing to premeditated, scalable cybercriminal operations globally distributed. <a href="https://circleid.com/postsdns-analysis-of-the-keenadu-backdoor-network">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> A DNS Exploration of Operation Olalampo (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsa-dns-exploration-of-operation-olalampo</guid>
		<link>https://circleid.com/postsa-dns-exploration-of-operation-olalampo</link>
		<description><![CDATA[MuddyWater's Operation Olalampo targets MENA entities using new malware and Telegram-based control, as DNS analysis uncovers fresh infrastructure, thousands of linked domains, and expanded indicators pointing to a broader, coordinated campaign. <a href="https://circleid.com/postsa-dns-exploration-of-operation-olalampo">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> DNS Deep Dive: LummaStealer + CastleLoader = Larger Threat (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsdns-deep-dive-lummastealer-castleloader-larger-threat</guid>
		<link>https://circleid.com/postsdns-deep-dive-lummastealer-castleloader-larger-threat</link>
		<description><![CDATA[LummaStealer's revival, paired with CastleLoader, reveals a more evasive malware ecosystem, leveraging obfuscation, DNS agility and vast infrastructure to reach over 100,000 potential victims while spawning hundreds of linked malicious domains and IPs globally observed. <a href="https://circleid.com/postsdns-deep-dive-lummastealer-castleloader-larger-threat">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> A Look Back at 11 of the Red Report 2026 Featured Threats (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsa-look-back-at-11-of-the-red-report-2026-featured-threats</guid>
		<link>https://circleid.com/postsa-look-back-at-11-of-the-red-report-2026-featured-threats</link>
		<description><![CDATA[An analysis of 11 cyber threats from Red Report 2026 reveals how attackers exploit core MITRE ATT&CK techniques, with DNS and IoC data exposing early warning signals, infrastructure scale, and evolving tactics across campaigns globally. <a href="https://circleid.com/postsa-look-back-at-11-of-the-red-report-2026-featured-threats">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> A Close Look under the DNS Hood of CoolClient (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsa-close-look-under-the-dns-hood-of-coolclient</guid>
		<link>https://circleid.com/postsa-close-look-under-the-dns-hood-of-coolclient</link>
		<description><![CDATA[Security researchers trace an updated CoolClient backdoor used by HoneyMyte, uncovering malicious domains, subdomains and IP links, and revealing a wider infrastructure of email and DNS-connected assets tied to data theft operations globally active. <a href="https://circleid.com/postsa-close-look-under-the-dns-hood-of-coolclient">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Probing the DNS Depths of PeckBirdy (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsprobing-the-dns-depths-of-peckbirdy</guid>
		<link>https://circleid.com/postsprobing-the-dns-depths-of-peckbirdy</link>
		<description><![CDATA[An analysis of DNS and WHOIS data tied to the PeckBirdy C&C framework uncovers expanded infrastructure, linking known IoCs to malicious domains, IPs, and email-connected assets across years of activity. <a href="https://circleid.com/postsprobing-the-dns-depths-of-peckbirdy">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> What Remains of Black Basta Now That Alleged Gang Leader Joined the Most Wanted List? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postswhat-remains-of-black-basta-now-that-alleged-gang-leader-joined-the-most-wanted-list</guid>
		<link>https://circleid.com/postswhat-remains-of-black-basta-now-that-alleged-gang-leader-joined-the-most-wanted-list</link>
		<description><![CDATA[As authorities pursue Black Basta's alleged leader, new analysis of campaign indicators reveals sprawling infrastructure, thousands of linked domains, and persistent ransomware tactics that rely on phishing, known vulnerabilities, and double-extortion pressure. <a href="https://circleid.com/postswhat-remains-of-black-basta-now-that-alleged-gang-leader-joined-the-most-wanted-list">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Top 10 Malware of Q4 2025: A DNS Deep Dive (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/poststop-10-malware-of-q4-2025-a-dns-deep-dive</guid>
		<link>https://circleid.com/poststop-10-malware-of-q4-2025-a-dns-deep-dive</link>
		<description><![CDATA[An analysis of 46 DNS indicators tied to seven of Q4 2025's most prevalent malware families reveals early warning signals, coordinated campaigns and hundreds of connected artifacts, underscoring the predictive power of proactive threat intelligence. <a href="https://circleid.com/poststop-10-malware-of-q4-2025-a-dns-deep-dive">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> A Look Back at the Top Ransomware Attack Targeting the Salesforce Supply Chain (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsa-look-back-at-the-top-ransomware-attack-targeting-the-salesforce-supply-chain</guid>
		<link>https://circleid.com/postsa-look-back-at-the-top-ransomware-attack-targeting-the-salesforce-supply-chain</link>
		<description><![CDATA[A sprawling ransomware campaign targeting Salesforce's SaaS supply chain topped 2025's breach rankings, exposing millions of records. Fresh DNS analysis uncovered 8,318 linked artifacts, revealing how overlooked indicators foreshadowed widespread, multisector disruption. <a href="https://circleid.com/postsa-look-back-at-the-top-ransomware-attack-targeting-the-salesforce-supply-chain">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> QakBot Named a 2026 Top Malware Threat: An IoC Analysis (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsqakbot-named-a-2026-top-malware-threat-an-ioc-analysis</guid>
		<link>https://circleid.com/postsqakbot-named-a-2026-top-malware-threat-an-ioc-analysis</link>
		<description><![CDATA[An IoC deep dive into QakBot, newly ranked among 2026's top malware threats, reveals sprawling infrastructure, recycled domains, and fresh artifacts, underscoring how phishing-led access campaigns continue to endanger email-reliant enterprises worldwide. <a href="https://circleid.com/postsqakbot-named-a-2026-top-malware-threat-an-ioc-analysis">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> The Rise of AI Agent Surface Management (ASM-AI) (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/poststhe-rise-of-ai-agent-surface-management-asm-ai</guid>
		<link>https://circleid.com/poststhe-rise-of-ai-agent-surface-management-asm-ai</link>
		<description><![CDATA[As AI agents gain delegated authority in enterprise systems, they introduce a new security frontier: ASM-AI. The real threat is no longer malicious code, but trusted bots making unsupervised, high-risk decisions. <a href="https://circleid.com/poststhe-rise-of-ai-agent-surface-management-asm-ai">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Probing the DNS Depths of PHALT#BLYX (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsprobing-the-dns-depths-of-phaltblyx</guid>
		<link>https://circleid.com/postsprobing-the-dns-depths-of-phaltblyx</link>
		<description><![CDATA[A stealthy phishing campaign known as PHALT#BLYX leveraged fake CAPTCHAs and BSOD screens to deploy DCRat, with forensic analysis uncovering widespread DNS misuse, typosquatting, and more than 21,000 email-connected domains. <a href="https://circleid.com/postsprobing-the-dns-depths-of-phaltblyx">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Divulging the DNS Secrets of DarkSpectre (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsdivulging-the-dns-secrets-of-darkspectre</guid>
		<link>https://circleid.com/postsdivulging-the-dns-secrets-of-darkspectre</link>
		<description><![CDATA[Koi Security exposes the DNS infrastructure behind DarkSpectre's latest cyber campaign. Their investigation uncovers nearly 9,000 suspect domains and IP links, revealing how a stealthy browser extension compromised 2.2 million users. <a href="https://circleid.com/postsdivulging-the-dns-secrets-of-darkspectre">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>