<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: cyberattack
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/cyberattack</link>
  <description>CircleID - Cyberattack</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-04-19T19:59:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[DNS Analysis of the Keenadu Backdoor Network]]></title>
      <link>https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</guid>

      <description><![CDATA[Keenadu backdoor embedded in Android firmware exploits supply chains and OTA updates, while DNS analysis of its infrastructure reveals coordinated domains, IP links, and early warning signals pointing to premeditated, scalable cybercriminal operations globally distributed.]]></description>
      <dc:date>2026-04-14T11:36:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Domain Security Report: Unicorns Show Strong Adoption in Key Domain Security Measures]]></title>
      <link>https://circleid.com/posts/domain&#45;security&#45;report&#45;unicorns&#45;show&#45;strong&#45;adoption&#45;in&#45;key&#45;domain&#45;security&#45;measures</link>
      <guid isPermaLink="true">https://circleid.com/posts/domain&#45;security&#45;report&#45;unicorns&#45;show&#45;strong&#45;adoption&#45;in&#45;key&#45;domain&#45;security&#45;measures</guid>

      <description><![CDATA[Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today.]]></description>
      <dc:date>2026-04-13T09:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Iran-Linked Cyberattacks Expose Fragility of America’s Industrial Nerve System]]></title>
      <link>https://circleid.com/posts/iran&#45;linked&#45;cyberattacks&#45;expose&#45;fragility&#45;of&#45;americas&#45;industrial&#45;nerve&#45;system</link>
      <guid isPermaLink="true">https://circleid.com/posts/iran&#45;linked&#45;cyberattacks&#45;expose&#45;fragility&#45;of&#45;americas&#45;industrial&#45;nerve&#45;system</guid>

      <description><![CDATA[Iran-linked hackers infiltrated US industrial control systems, disrupting energy and water infrastructure. The attacks highlight systemic vulnerabilities in internet-connected devices and signal an enduring cyber threat despite easing geopolitical tensions.]]></description>
      <dc:date>2026-04-10T12:41:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A DNS Exploration of Operation Olalampo]]></title>
      <link>https://circleid.com/posts/a&#45;dns&#45;exploration&#45;of&#45;operation&#45;olalampo</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;dns&#45;exploration&#45;of&#45;operation&#45;olalampo</guid>

      <description><![CDATA[MuddyWater's Operation Olalampo targets MENA entities using new malware and Telegram-based control, as DNS analysis uncovers fresh infrastructure, thousands of linked domains, and expanded indicators pointing to a broader, coordinated campaign.]]></description>
      <dc:date>2026-04-10T12:27:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Kinetic Frontier: Lessons From Geopolitical Violence and the Bunkerization of AI Infrastructure]]></title>
      <link>https://circleid.com/posts/the&#45;kinetic&#45;frontier&#45;lessons&#45;from&#45;geopolitical&#45;violence&#45;and&#45;the&#45;bunkerization&#45;of&#45;ai&#45;infrastructure</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;kinetic&#45;frontier&#45;lessons&#45;from&#45;geopolitical&#45;violence&#45;and&#45;the&#45;bunkerization&#45;of&#45;ai&#45;infrastructure</guid>

      <description><![CDATA[Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival.]]></description>
      <dc:date>2026-04-08T12:45:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Deep Dive: LummaStealer + CastleLoader = Larger Threat]]></title>
      <link>https://circleid.com/posts/dns&#45;deep&#45;dive&#45;lummastealer&#45;castleloader&#45;larger&#45;threat</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;deep&#45;dive&#45;lummastealer&#45;castleloader&#45;larger&#45;threat</guid>

      <description><![CDATA[LummaStealer's revival, paired with CastleLoader, reveals a more evasive malware ecosystem, leveraging obfuscation, DNS agility and vast infrastructure to reach over 100,000 potential victims while spawning hundreds of linked malicious domains and IPs globally observed.]]></description>
      <dc:date>2026-04-07T12:29:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Securing Africa&#8217;s Digital Future: Why Cybersecurity Must Lead Digital Transformation]]></title>
      <link>https://circleid.com/posts/securing&#45;africaas&#45;digital&#45;future&#45;why&#45;cybersecurity&#45;must&#45;lead&#45;digital&#45;transformation</link>
      <guid isPermaLink="true">https://circleid.com/posts/securing&#45;africaas&#45;digital&#45;future&#45;why&#45;cybersecurity&#45;must&#45;lead&#45;digital&#45;transformation</guid>

      <description><![CDATA[Africa's rapid digital expansion, from fintech to e-government, is outpacing its cybersecurity capacity, leaving critical systems exposed and trust at risk unless governments embed security as a core pillar of development across the continent today.]]></description>
      <dc:date>2026-04-06T13:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Look Back at 11 of the Red Report 2026 Featured Threats]]></title>
      <link>https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;11&#45;of&#45;the&#45;red&#45;report&#45;2026&#45;featured&#45;threats</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;11&#45;of&#45;the&#45;red&#45;report&#45;2026&#45;featured&#45;threats</guid>

      <description><![CDATA[An analysis of 11 cyber threats from Red Report 2026 reveals how attackers exploit core MITRE ATT&CK techniques, with DNS and IoC data exposing early warning signals, infrastructure scale, and evolving tactics across campaigns globally.]]></description>
      <dc:date>2026-03-31T12:10:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Concerns Over America’s WiFi Router Ban]]></title>
      <link>https://circleid.com/posts/wifi&#45;router&#45;ban</link>
      <guid isPermaLink="true">https://circleid.com/posts/wifi&#45;router&#45;ban</guid>

      <description><![CDATA[America's FCC has barred new foreign-made consumer routers on security grounds, tightening supply for ISPs and households while raising costs and risking technological lag unless domestic manufacturing or approvals quickly expand in coming years significantly.]]></description>
      <dc:date>2026-03-30T13:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Close Look under the DNS Hood of CoolClient]]></title>
      <link>https://circleid.com/posts/a&#45;close&#45;look&#45;under&#45;the&#45;dns&#45;hood&#45;of&#45;coolclient</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;close&#45;look&#45;under&#45;the&#45;dns&#45;hood&#45;of&#45;coolclient</guid>

      <description><![CDATA[Security researchers trace an updated CoolClient backdoor used by HoneyMyte, uncovering malicious domains, subdomains and IP links, and revealing a wider infrastructure of email and DNS-connected assets tied to data theft operations globally active.]]></description>
      <dc:date>2026-03-24T14:00:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Iran Targeted by Self-Propagating Malware in Supply-Chain Cyberattacks]]></title>
      <link>https://circleid.com/posts/iran&#45;targeted&#45;by&#45;self&#45;propagating&#45;malware&#45;in&#45;supply&#45;chain&#45;cyberattacks</link>
      <guid isPermaLink="true">https://circleid.com/posts/iran&#45;targeted&#45;by&#45;self&#45;propagating&#45;malware&#45;in&#45;supply&#45;chain&#45;cyberattacks</guid>

      <description><![CDATA[Self-propagating malware hidden in open-source software is targeting Iranian systems, wiping data on infected machines while sparing others, signalling a shift towards precise, politically motivated cyber sabotage through widely trusted digital supply chains.]]></description>
      <dc:date>2026-03-24T12:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[FCC Alert on Cybersecurity Risks]]></title>
      <link>https://circleid.com/posts/fcc&#45;alert&#45;on&#45;cybersecurity&#45;risks</link>
      <guid isPermaLink="true">https://circleid.com/posts/fcc&#45;alert&#45;on&#45;cybersecurity&#45;risks</guid>

      <description><![CDATA[The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning.]]></description>
      <dc:date>2026-03-13T10:19:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Probing the DNS Depths of PeckBirdy]]></title>
      <link>https://circleid.com/posts/probing&#45;the&#45;dns&#45;depths&#45;of&#45;peckbirdy</link>
      <guid isPermaLink="true">https://circleid.com/posts/probing&#45;the&#45;dns&#45;depths&#45;of&#45;peckbirdy</guid>

      <description><![CDATA[An analysis of DNS and WHOIS data tied to the PeckBirdy C&C framework uncovers expanded infrastructure, linking known IoCs to malicious domains, IPs, and email-connected assets across years of activity.]]></description>
      <dc:date>2026-03-13T10:09:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Kadnap Malware Infects 14,000 Routers Worldwide, Designed to Resist Takedowns Experts Warn]]></title>
      <link>https://circleid.com/posts/kadnap&#45;malware&#45;infects&#45;14000&#45;routers&#45;worldwide&#45;designed&#45;to&#45;resist&#45;takedowns&#45;experts&#45;warn</link>
      <guid isPermaLink="true">https://circleid.com/posts/kadnap&#45;malware&#45;infects&#45;14000&#45;routers&#45;worldwide&#45;designed&#45;to&#45;resist&#45;takedowns&#45;experts&#45;warn</guid>

      <description><![CDATA[Security researchers have uncovered Kadnap malware infecting more than 14,000 routers worldwide, forming a resilient peer-to-peer botnet that exploits outdated edge devices and could enable covert communications, proxy traffic, and future cyber attacks.]]></description>
      <dc:date>2026-03-12T10:12:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Iran&#8217;s Digital Arsenal: When Invisible Fences Rise in the Conflict]]></title>
      <link>https://circleid.com/posts/irans&#45;digital&#45;arsenal&#45;when&#45;invisible&#45;fences&#45;rise&#45;in&#45;the&#45;conflict</link>
      <guid isPermaLink="true">https://circleid.com/posts/irans&#45;digital&#45;arsenal&#45;when&#45;invisible&#45;fences&#45;rise&#45;in&#45;the&#45;conflict</guid>

      <description><![CDATA[Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today.]]></description>
      <dc:date>2026-03-12T09:35:00-07:00</dc:date>
    </item>
  

  </channel>
  

</rss>