<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: cyberattack
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/cyberattack</link>
  <description>CircleID - Cyberattack</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-04-30T19:14:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[Unearthing DNS Facts about UAT-8099]]></title>
      <link>https://circleid.com/posts/unearthing&#45;dns&#45;facts&#45;about&#45;uat&#45;8099</link>
      <guid isPermaLink="true">https://circleid.com/posts/unearthing&#45;dns&#45;facts&#45;about&#45;uat&#45;8099</guid>

      <description><![CDATA[WhoisXML API analysis deepens understanding of the UAT-8099 campaign, uncovering expanded DNS infrastructure, early indicators of malicious intent, and thousands of linked artifacts, underscoring the group's evolving tactics and regional focus across Asia.]]></description>
      <dc:date>2026-04-29T12:21:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Fake Domains, Real Damage: What the Latest Data Reveals]]></title>
      <link>https://circleid.com/posts/fake&#45;domains&#45;real&#45;damage&#45;what&#45;the&#45;latest&#45;data&#45;reveals</link>
      <guid isPermaLink="true">https://circleid.com/posts/fake&#45;domains&#45;real&#45;damage&#45;what&#45;the&#45;latest&#45;data&#45;reveals</guid>

      <description><![CDATA[Third-party domains exploiting brand names are proliferating, with 88% of homoglyphs externally owned. Many remain dormant yet email-enabled, creating scalable phishing risks as attackers increasingly target trust rather than infrastructure.]]></description>
      <dc:date>2026-04-24T14:57:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[ForceMemo in the DNS Spotlight]]></title>
      <link>https://circleid.com/posts/forcememo&#45;in&#45;the&#45;dns&#45;spotlight</link>
      <guid isPermaLink="true">https://circleid.com/posts/forcememo&#45;in&#45;the&#45;dns&#45;spotlight</guid>

      <description><![CDATA[Researchers tracing the ForceMemo campaign uncover a sprawling DNS footprint, linking compromised GitHub repositories to suspicious domains, shared infrastructure and fresh artifacts, suggesting a coordinated operation that continues to evolve despite partial attribution.]]></description>
      <dc:date>2026-04-23T11:11:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Analysis of the Keenadu Backdoor Network]]></title>
      <link>https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</guid>

      <description><![CDATA[Keenadu backdoor embedded in Android firmware exploits supply chains and OTA updates, while DNS analysis of its infrastructure reveals coordinated domains, IP links, and early warning signals pointing to premeditated, scalable cybercriminal operations globally distributed.]]></description>
      <dc:date>2026-04-14T11:36:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Domain Security Report: Unicorns Show Strong Adoption in Key Domain Security Measures]]></title>
      <link>https://circleid.com/posts/domain&#45;security&#45;report&#45;unicorns&#45;show&#45;strong&#45;adoption&#45;in&#45;key&#45;domain&#45;security&#45;measures</link>
      <guid isPermaLink="true">https://circleid.com/posts/domain&#45;security&#45;report&#45;unicorns&#45;show&#45;strong&#45;adoption&#45;in&#45;key&#45;domain&#45;security&#45;measures</guid>

      <description><![CDATA[Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today.]]></description>
      <dc:date>2026-04-13T09:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Iran-Linked Cyberattacks Expose Fragility of America’s Industrial Nerve System]]></title>
      <link>https://circleid.com/posts/iran&#45;linked&#45;cyberattacks&#45;expose&#45;fragility&#45;of&#45;americas&#45;industrial&#45;nerve&#45;system</link>
      <guid isPermaLink="true">https://circleid.com/posts/iran&#45;linked&#45;cyberattacks&#45;expose&#45;fragility&#45;of&#45;americas&#45;industrial&#45;nerve&#45;system</guid>

      <description><![CDATA[Iran-linked hackers infiltrated US industrial control systems, disrupting energy and water infrastructure. The attacks highlight systemic vulnerabilities in internet-connected devices and signal an enduring cyber threat despite easing geopolitical tensions.]]></description>
      <dc:date>2026-04-10T12:41:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A DNS Exploration of Operation Olalampo]]></title>
      <link>https://circleid.com/posts/a&#45;dns&#45;exploration&#45;of&#45;operation&#45;olalampo</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;dns&#45;exploration&#45;of&#45;operation&#45;olalampo</guid>

      <description><![CDATA[MuddyWater's Operation Olalampo targets MENA entities using new malware and Telegram-based control, as DNS analysis uncovers fresh infrastructure, thousands of linked domains, and expanded indicators pointing to a broader, coordinated campaign.]]></description>
      <dc:date>2026-04-10T12:27:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Kinetic Frontier: Lessons From Geopolitical Violence and the Bunkerization of AI Infrastructure]]></title>
      <link>https://circleid.com/posts/the&#45;kinetic&#45;frontier&#45;lessons&#45;from&#45;geopolitical&#45;violence&#45;and&#45;the&#45;bunkerization&#45;of&#45;ai&#45;infrastructure</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;kinetic&#45;frontier&#45;lessons&#45;from&#45;geopolitical&#45;violence&#45;and&#45;the&#45;bunkerization&#45;of&#45;ai&#45;infrastructure</guid>

      <description><![CDATA[Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival.]]></description>
      <dc:date>2026-04-08T12:45:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Deep Dive: LummaStealer + CastleLoader = Larger Threat]]></title>
      <link>https://circleid.com/posts/dns&#45;deep&#45;dive&#45;lummastealer&#45;castleloader&#45;larger&#45;threat</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;deep&#45;dive&#45;lummastealer&#45;castleloader&#45;larger&#45;threat</guid>

      <description><![CDATA[LummaStealer's revival, paired with CastleLoader, reveals a more evasive malware ecosystem, leveraging obfuscation, DNS agility and vast infrastructure to reach over 100,000 potential victims while spawning hundreds of linked malicious domains and IPs globally observed.]]></description>
      <dc:date>2026-04-07T12:29:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Securing Africa&#8217;s Digital Future: Why Cybersecurity Must Lead Digital Transformation]]></title>
      <link>https://circleid.com/posts/securing&#45;africaas&#45;digital&#45;future&#45;why&#45;cybersecurity&#45;must&#45;lead&#45;digital&#45;transformation</link>
      <guid isPermaLink="true">https://circleid.com/posts/securing&#45;africaas&#45;digital&#45;future&#45;why&#45;cybersecurity&#45;must&#45;lead&#45;digital&#45;transformation</guid>

      <description><![CDATA[Africa's rapid digital expansion, from fintech to e-government, is outpacing its cybersecurity capacity, leaving critical systems exposed and trust at risk unless governments embed security as a core pillar of development across the continent today.]]></description>
      <dc:date>2026-04-06T13:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Look Back at 11 of the Red Report 2026 Featured Threats]]></title>
      <link>https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;11&#45;of&#45;the&#45;red&#45;report&#45;2026&#45;featured&#45;threats</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;11&#45;of&#45;the&#45;red&#45;report&#45;2026&#45;featured&#45;threats</guid>

      <description><![CDATA[An analysis of 11 cyber threats from Red Report 2026 reveals how attackers exploit core MITRE ATT&CK techniques, with DNS and IoC data exposing early warning signals, infrastructure scale, and evolving tactics across campaigns globally.]]></description>
      <dc:date>2026-03-31T12:10:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Concerns Over America’s WiFi Router Ban]]></title>
      <link>https://circleid.com/posts/wifi&#45;router&#45;ban</link>
      <guid isPermaLink="true">https://circleid.com/posts/wifi&#45;router&#45;ban</guid>

      <description><![CDATA[America's FCC has barred new foreign-made consumer routers on security grounds, tightening supply for ISPs and households while raising costs and risking technological lag unless domestic manufacturing or approvals quickly expand in coming years significantly.]]></description>
      <dc:date>2026-03-30T13:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Close Look under the DNS Hood of CoolClient]]></title>
      <link>https://circleid.com/posts/a&#45;close&#45;look&#45;under&#45;the&#45;dns&#45;hood&#45;of&#45;coolclient</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;close&#45;look&#45;under&#45;the&#45;dns&#45;hood&#45;of&#45;coolclient</guid>

      <description><![CDATA[Security researchers trace an updated CoolClient backdoor used by HoneyMyte, uncovering malicious domains, subdomains and IP links, and revealing a wider infrastructure of email and DNS-connected assets tied to data theft operations globally active.]]></description>
      <dc:date>2026-03-24T14:00:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Iran Targeted by Self-Propagating Malware in Supply-Chain Cyberattacks]]></title>
      <link>https://circleid.com/posts/iran&#45;targeted&#45;by&#45;self&#45;propagating&#45;malware&#45;in&#45;supply&#45;chain&#45;cyberattacks</link>
      <guid isPermaLink="true">https://circleid.com/posts/iran&#45;targeted&#45;by&#45;self&#45;propagating&#45;malware&#45;in&#45;supply&#45;chain&#45;cyberattacks</guid>

      <description><![CDATA[Self-propagating malware hidden in open-source software is targeting Iranian systems, wiping data on infected machines while sparing others, signalling a shift towards precise, politically motivated cyber sabotage through widely trusted digital supply chains.]]></description>
      <dc:date>2026-03-24T12:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[FCC Alert on Cybersecurity Risks]]></title>
      <link>https://circleid.com/posts/fcc&#45;alert&#45;on&#45;cybersecurity&#45;risks</link>
      <guid isPermaLink="true">https://circleid.com/posts/fcc&#45;alert&#45;on&#45;cybersecurity&#45;risks</guid>

      <description><![CDATA[The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning.]]></description>
      <dc:date>2026-03-13T10:19:00-07:00</dc:date>
    </item>
  

  </channel>
  

</rss>