<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-30T19:14:00+00:00</dc:date>

	
	<item>
		<title> Thousands of Third-Party Domains Target Super Bowl Betting Brands (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/poststhousands-of-third-party-domains-target-super-bowl-betting-brands</guid>
		<link>https://circleid.com/poststhousands-of-third-party-domains-target-super-bowl-betting-brands</link>
		<description><![CDATA[When major events like the Super Bowl are on the horizon, cybercriminals exploit public trust by creating fraudulent domains for fake betting sites, phishing, and malware distribution. CSC's research into top online sportsbooks highlights the hidden risks of dormant domains, which, though inactive, can quickly be repurposed for cyber attacks. Overlooked yet dangerous, these domains play a key role in impersonation, misinformation, and scams targeting event-driven traffic, underscoring the need for continuous monitoring of lookalike, dropped, re-registered, and newly registered domains. <a href="https://circleid.com/poststhousands-of-third-party-domains-target-super-bowl-betting-brands">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> How Dormant Domains Can Be Weaponized During Events Like the 2024 U.S. Election (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postshow-dormant-domains-can-be-weaponized-during-events</guid>
		<link>https://circleid.com/postshow-dormant-domains-can-be-weaponized-during-events</link>
		<description><![CDATA[As with any high-stakes event, elections have become a prime target for cybercriminals seeking to exploit public trust through impersonation, misinformation, and scams. CSC's comprehensive research about the 2024 U.S. Election reveals the alarming role of dormant domains, which have the potential to be exploited for launching cyber attacks against political campaigns, organizations, and constituents. <a href="https://circleid.com/postshow-dormant-domains-can-be-weaponized-during-events">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Growing Popularity of .AI and Domain Security (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20240307-growing-popularity-of-dot-ai-and-domain-security</guid>
		<link>https://circleid.com/posts20240307-growing-popularity-of-dot-ai-and-domain-security</link>
		<description><![CDATA[I recently had the opportunity to speak on a podcast with Dave Bittner at CyberWire to discuss how .AI is giving cybercriminals a new avenue to take advantage of some of the largest companies in the world based on research findings from CSC's 2023 Domain Security Report. Below is a summary of the key points discussed during this podcast. <a href="https://circleid.com/posts20240307-growing-popularity-of-dot-ai-and-domain-security">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	
	<item>
		<title> New Research from CSC on the Impact of COVID-19 on Internet Security and Safety (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20220126-new-research-from-csc-on-the-impact-of-covid-19-on-internet-security-and-safety</guid>
		<link>https://circleid.com/posts20220126-new-research-from-csc-on-the-impact-of-covid-19-on-internet-security-and-safety</link>
		<description><![CDATA[Hackers are using company domain names for malicious attacks more than ever before. Established research shows that phishing and related malware attacks most commonly occur from a compromised or hijacked legitimate domain name, a maliciously registered, confusingly similar domain name, or via email header spoofing. Domain security intelligence is the first line of defense in preventing domain cyberattacks. <a href="https://circleid.com/posts20220126-new-research-from-csc-on-the-impact-of-covid-19-on-internet-security-and-safety">More...</a>]]></description>
		<dc:date>2026-04-30T12:14:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>