<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: cybercrime
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/cybercrime</link>
  <description>CircleID - Cybercrime</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-04-30T19:14:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[Fake Domains, Real Damage: What the Latest Data Reveals]]></title>
      <link>https://circleid.com/posts/fake&#45;domains&#45;real&#45;damage&#45;what&#45;the&#45;latest&#45;data&#45;reveals</link>
      <guid isPermaLink="true">https://circleid.com/posts/fake&#45;domains&#45;real&#45;damage&#45;what&#45;the&#45;latest&#45;data&#45;reveals</guid>

      <description><![CDATA[Third-party domains exploiting brand names are proliferating, with 88% of homoglyphs externally owned. Many remain dormant yet email-enabled, creating scalable phishing risks as attackers increasingly target trust rather than infrastructure.]]></description>
      <dc:date>2026-04-24T14:57:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Domains: The Overlooked Frontline in IP Protection]]></title>
      <link>https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</link>
      <guid isPermaLink="true">https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</guid>

      <description><![CDATA[Domains have quietly become the primary entry point for online IP infringement, yet most firms lack visibility over portfolios, leaving brands exposed and prompting a shift toward integrated, proactive domain governance and security.]]></description>
      <dc:date>2026-04-15T13:22:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Why Africa&#8217;s Cybersecurity Problem Has Nothing to Do with Hackers]]></title>
      <link>https://circleid.com/posts/why&#45;africaas&#45;cybersecurity&#45;problem&#45;has&#45;nothing&#45;to&#45;do&#45;with&#45;hackers</link>
      <guid isPermaLink="true">https://circleid.com/posts/why&#45;africaas&#45;cybersecurity&#45;problem&#45;has&#45;nothing&#45;to&#45;do&#45;with&#45;hackers</guid>

      <description><![CDATA[Africa's cybersecurity failures stem less from sophisticated hackers than from insecure system design, weak governance and limited skills, leaving institutions exposed and shifting the challenge from external threats to internal accountability and resilience.]]></description>
      <dc:date>2026-04-12T14:17:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Africa&#8217;s AI Governance Crisis Is Not a Regulatory Gap, It Is a Sovereignty Emergency]]></title>
      <link>https://circleid.com/posts/africas&#45;ai&#45;governance&#45;crisis&#45;is&#45;not&#45;a&#45;regulatory&#45;gap&#45;it&#45;is&#45;a&#45;sovereignty&#45;emergency</link>
      <guid isPermaLink="true">https://circleid.com/posts/africas&#45;ai&#45;governance&#45;crisis&#45;is&#45;not&#45;a&#45;regulatory&#45;gap&#45;it&#45;is&#45;a&#45;sovereignty&#45;emergency</guid>

      <description><![CDATA[Africa's looming AI rules expose a deeper problem: foreign-controlled infrastructure, weak enforcement capacity and externally governed data flows are eroding digital sovereignty, leaving states unable to regulate, protect citizens or meet global obligations.]]></description>
      <dc:date>2026-04-08T09:28:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Trusted Notifier Network (TNN) Core Concept 1: Unfair Cost Transfer and Reversal of Commercial Best]]></title>
      <link>https://circleid.com/posts/trusted&#45;notifier&#45;network&#45;tnn&#45;core&#45;concept&#45;1&#45;unfair&#45;cost&#45;transfer&#45;and&#45;reversal&#45;of&#45;commercial&#45;best</link>
      <guid isPermaLink="true">https://circleid.com/posts/trusted&#45;notifier&#45;network&#45;tnn&#45;core&#45;concept&#45;1&#45;unfair&#45;cost&#45;transfer&#45;and&#45;reversal&#45;of&#45;commercial&#45;best</guid>

      <description><![CDATA[A flawed abuse-response system shifts costs from perpetrators to intermediaries, overwhelming enforcement. The Trusted Notifier Network seeks to realign incentives, curb low-quality reporting, and restore efficiency by embedding trust, accountability, and cost redistribution.]]></description>
      <dc:date>2026-04-07T09:18:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Securing Africa&#8217;s Digital Future: Why Cybersecurity Must Lead Digital Transformation]]></title>
      <link>https://circleid.com/posts/securing&#45;africaas&#45;digital&#45;future&#45;why&#45;cybersecurity&#45;must&#45;lead&#45;digital&#45;transformation</link>
      <guid isPermaLink="true">https://circleid.com/posts/securing&#45;africaas&#45;digital&#45;future&#45;why&#45;cybersecurity&#45;must&#45;lead&#45;digital&#45;transformation</guid>

      <description><![CDATA[Africa's rapid digital expansion, from fintech to e-government, is outpacing its cybersecurity capacity, leaving critical systems exposed and trust at risk unless governments embed security as a core pillar of development across the continent today.]]></description>
      <dc:date>2026-04-06T13:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Securing Digital Brand Borders in a Fragmented World]]></title>
      <link>https://circleid.com/posts/securing&#45;digital&#45;brand&#45;borders&#45;in&#45;a&#45;fragmented&#45;world</link>
      <guid isPermaLink="true">https://circleid.com/posts/securing&#45;digital&#45;brand&#45;borders&#45;in&#45;a&#45;fragmented&#45;world</guid>

      <description><![CDATA[GlobalBlock's expansion into China and Germany signals a shift from reactive brand protection to centralized prevention, as firms seek scalable, cost efficient defences against proliferating AI driven domain abuse worldwide amid a fragmented digital landscape.]]></description>
      <dc:date>2026-03-31T14:29:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Moving Beyond Associated Domain Checks: The Urgent Need to Ban Short-Term Domain Leasing]]></title>
      <link>https://circleid.com/posts/moving&#45;beyond&#45;associated&#45;domain&#45;checks&#45;the&#45;urgent&#45;need&#45;to&#45;ban&#45;short&#45;term&#45;domain&#45;leasing</link>
      <guid isPermaLink="true">https://circleid.com/posts/moving&#45;beyond&#45;associated&#45;domain&#45;checks&#45;the&#45;urgent&#45;need&#45;to&#45;ban&#45;short&#45;term&#45;domain&#45;leasing</guid>

      <description><![CDATA[ICANN's new DNS abuse rules mark progress, yet short-term domain leasing enables fleeting, hard-to-detect attacks. A proposed 30-day minimum lease could curb cybercrime by undermining the economics of weaponised parked domains.]]></description>
      <dc:date>2026-03-31T09:33:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Concerns Over America’s WiFi Router Ban]]></title>
      <link>https://circleid.com/posts/wifi&#45;router&#45;ban</link>
      <guid isPermaLink="true">https://circleid.com/posts/wifi&#45;router&#45;ban</guid>

      <description><![CDATA[America's FCC has barred new foreign-made consumer routers on security grounds, tightening supply for ISPs and households while raising costs and risking technological lag unless domestic manufacturing or approvals quickly expand in coming years significantly.]]></description>
      <dc:date>2026-03-30T13:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Five Things the UN Permanent Mechanism on Cybersecurity Must Actually Deliver]]></title>
      <link>https://circleid.com/posts/five&#45;things&#45;the&#45;un&#45;permanent&#45;mechanism&#45;on&#45;cybersecurity&#45;must&#45;actually&#45;deliver</link>
      <guid isPermaLink="true">https://circleid.com/posts/five&#45;things&#45;the&#45;un&#45;permanent&#45;mechanism&#45;on&#45;cybersecurity&#45;must&#45;actually&#45;deliver</guid>

      <description><![CDATA[The UN's new permanent cybersecurity mechanism promises continuity after decades of fleeting forums, yet risks irrelevance unless states enforce existing law, bridge cybercrime divides, address AI threats, build practical capacity, and include non-state expertise meaningfully.]]></description>
      <dc:date>2026-03-30T08:48:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Growing Role of Threat Intelligence in Internet Infrastructure Security]]></title>
      <link>https://circleid.com/posts/the&#45;growing&#45;role&#45;of&#45;threat&#45;intelligence&#45;in&#45;internet&#45;infrastructure&#45;security</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;growing&#45;role&#45;of&#45;threat&#45;intelligence&#45;in&#45;internet&#45;infrastructure&#45;security</guid>

      <description><![CDATA[Threat intelligence is shifting from a passive feed to a core operational layer, helping infrastructure defenders connect fragmented signals, identify recurring attack patterns, and prioritise responses in an increasingly modular and fast-moving cybercrime ecosystem.]]></description>
      <dc:date>2026-03-25T13:22:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[FCC Alert on Cybersecurity Risks]]></title>
      <link>https://circleid.com/posts/fcc&#45;alert&#45;on&#45;cybersecurity&#45;risks</link>
      <guid isPermaLink="true">https://circleid.com/posts/fcc&#45;alert&#45;on&#45;cybersecurity&#45;risks</guid>

      <description><![CDATA[The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning.]]></description>
      <dc:date>2026-03-13T10:19:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Greater Cyber Resilience Through AI: eco - Association Publishes 5-Step Plan for Companies]]></title>
      <link>https://circleid.com/posts/greater&#45;cyber&#45;resilience&#45;through&#45;ai&#45;eco&#45;association&#45;publishes&#45;5&#45;step&#45;plan&#45;for&#45;companies</link>
      <guid isPermaLink="true">https://circleid.com/posts/greater&#45;cyber&#45;resilience&#45;through&#45;ai&#45;eco&#45;association&#45;publishes&#45;5&#45;step&#45;plan&#45;for&#45;companies</guid>

      <description><![CDATA[eco Association of the Internet Industry releases a white paper outlining a five-step framework to help companies integrate AI securely, counter emerging threats like deepfakes and phishing, and strengthen cyber resilience.]]></description>
      <dc:date>2026-03-13T09:49:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[How Bad Actors Are Leveraging DNS: Looking at the Latest Trends]]></title>
      <link>https://circleid.com/posts/how&#45;bad&#45;actors&#45;are&#45;leveraging&#45;dns&#45;looking&#45;at&#45;the&#45;latest&#45;trends</link>
      <guid isPermaLink="true">https://circleid.com/posts/how&#45;bad&#45;actors&#45;are&#45;leveraging&#45;dns&#45;looking&#45;at&#45;the&#45;latest&#45;trends</guid>

      <description><![CDATA[Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence.]]></description>
      <dc:date>2026-03-11T09:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Why DNS-Level Piracy Enforcement Is a Trap]]></title>
      <link>https://circleid.com/posts/why&#45;dns&#45;level&#45;piracy&#45;enforcement&#45;is&#45;a&#45;trap</link>
      <guid isPermaLink="true">https://circleid.com/posts/why&#45;dns&#45;level&#45;piracy&#45;enforcement&#45;is&#45;a&#45;trap</guid>

      <description><![CDATA[Efforts to combat online piracy are pushing courts to weaponise the Internet's naming system. Turning DNS operators into enforcement agents may deliver quick takedowns, but risks collateral damage, jurisdictional conflict and long-term fragmentation of the Internet.]]></description>
      <dc:date>2026-03-05T08:51:00-08:00</dc:date>
    </item>
  

  </channel>
  

</rss>