<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: cybercrime
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/cybercrime</link>
  <description>CircleID - Cybercrime</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-05-22T15:06:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[Procedural Resilience or Technological Rigidity? Reassessing Article 19&#8217;s DNS Abuse Framework in the Post-MLAT Era]]></title>
      <link>https://circleid.com/posts/procedural&#45;resilience&#45;or&#45;technological&#45;rigidity&#45;article&#45;19s&#45;dns&#45;abuse&#45;framework</link>
      <guid isPermaLink="true">https://circleid.com/posts/procedural&#45;resilience&#45;or&#45;technological&#45;rigidity&#45;article&#45;19s&#45;dns&#45;abuse&#45;framework</guid>

      <description><![CDATA[As cross-border cyber enforcement falters, critics argue Article 19's DNS abuse framework prioritizes procedural purity over user protection, leaving courts too slow to counter AI-driven phishing, rapid-flux domains, and increasingly automated online threats.]]></description>
      <dc:date>2026-05-18T12:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[AI-Driven Cyber Threats Are Growing, Google Warns]]></title>
      <link>https://circleid.com/posts/ai&#45;driven&#45;cyber&#45;threats&#45;are&#45;growing&#45;google&#45;warns</link>
      <guid isPermaLink="true">https://circleid.com/posts/ai&#45;driven&#45;cyber&#45;threats&#45;are&#45;growing&#45;google&#45;warns</guid>

      <description><![CDATA[Google says cybercriminals and state-backed hackers are rapidly adopting generative AI to automate attacks, disguise malware, exploit vulnerabilities and spread disinformation, marking a shift from experimental use to industrial-scale cyber operations across the global threat landscape.]]></description>
      <dc:date>2026-05-12T12:26:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Abuse Is Stealing India&#8217;s Youth: Fake Domains and the Job-Seeking Trap]]></title>
      <link>https://circleid.com/posts/dns&#45;abuse&#45;is&#45;stealing&#45;indias&#45;youth&#45;fake&#45;domains&#45;and&#45;the&#45;job&#45;seeking&#45;trap</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;abuse&#45;is&#45;stealing&#45;indias&#45;youth&#45;fake&#45;domains&#45;and&#45;the&#45;job&#45;seeking&#45;trap</guid>

      <description><![CDATA[Fake recruitment websites exploiting India's young job seekers are proliferating, exposing millions to identity theft, financial fraud and malware while regulators, registrars and digital literacy programs struggle to keep pace with a growing labor market.]]></description>
      <dc:date>2026-05-12T12:09:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Steven Bellovin Takes Aim at Cybersecurity Myths in New Book]]></title>
      <link>https://circleid.com/posts/steven&#45;bellovin&#45;takes&#45;aim&#45;at&#45;cybersecurity&#45;myths&#45;in&#45;new&#45;book</link>
      <guid isPermaLink="true">https://circleid.com/posts/steven&#45;bellovin&#45;takes&#45;aim&#45;at&#45;cybersecurity&#45;myths&#45;in&#45;new&#45;book</guid>

      <description><![CDATA[Cybersecurity pioneer Steven Bellovin's new book strips away jargon and outdated online-safety advice, offering ordinary users practical guidance on passwords, phishing, privacy and digital habits in an era of constant cyber threats and increasingly sophisticated scams.]]></description>
      <dc:date>2026-05-07T12:30:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Firms Stick With &#8220;.com&#8221; While Cyber Risks Redefine Domain Strategy]]></title>
      <link>https://circleid.com/posts/firms&#45;stick&#45;with&#45;.com&#45;while&#45;cyber&#45;risks&#45;redefine&#45;domain&#45;strategy</link>
      <guid isPermaLink="true">https://circleid.com/posts/firms&#45;stick&#45;with&#45;.com&#45;while&#45;cyber&#45;risks&#45;redefine&#45;domain&#45;strategy</guid>

      <description><![CDATA[Corporate domain strategies remain anchored in legacy extensions even as new domains proliferate, forcing firms to balance global reach, regional needs and rising fraud risks in an increasingly complex digital landscape.]]></description>
      <dc:date>2026-05-06T11:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Africa&#8217;s Digital Transformation Is Outpacing Its Cybersecurity Governance]]></title>
      <link>https://circleid.com/posts/africaas&#45;digital&#45;transformation&#45;is&#45;outpacing&#45;its&#45;cybersecurity&#45;governance</link>
      <guid isPermaLink="true">https://circleid.com/posts/africaas&#45;digital&#45;transformation&#45;is&#45;outpacing&#45;its&#45;cybersecurity&#45;governance</guid>

      <description><![CDATA[Africa's digital boom is accelerating, but safeguards lag. Governments and firms deploy systems at speed, while weak enforcement and fragmented oversight leave economies exposed to mounting cyber risks.]]></description>
      <dc:date>2026-05-04T11:51:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Fake Domains, Real Damage: What the Latest Data Reveals]]></title>
      <link>https://circleid.com/posts/fake&#45;domains&#45;real&#45;damage&#45;what&#45;the&#45;latest&#45;data&#45;reveals</link>
      <guid isPermaLink="true">https://circleid.com/posts/fake&#45;domains&#45;real&#45;damage&#45;what&#45;the&#45;latest&#45;data&#45;reveals</guid>

      <description><![CDATA[Third-party domains exploiting brand names are proliferating, with 88% of homoglyphs externally owned. Many remain dormant yet email-enabled, creating scalable phishing risks as attackers increasingly target trust rather than infrastructure.]]></description>
      <dc:date>2026-04-24T14:57:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Domains: The Overlooked Frontline in IP Protection]]></title>
      <link>https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</link>
      <guid isPermaLink="true">https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</guid>

      <description><![CDATA[Domains have quietly become the primary entry point for online IP infringement, yet most firms lack visibility over portfolios, leaving brands exposed and prompting a shift toward integrated, proactive domain governance and security.]]></description>
      <dc:date>2026-04-15T13:22:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Why Africa&#8217;s Cybersecurity Problem Has Nothing to Do with Hackers]]></title>
      <link>https://circleid.com/posts/why&#45;africaas&#45;cybersecurity&#45;problem&#45;has&#45;nothing&#45;to&#45;do&#45;with&#45;hackers</link>
      <guid isPermaLink="true">https://circleid.com/posts/why&#45;africaas&#45;cybersecurity&#45;problem&#45;has&#45;nothing&#45;to&#45;do&#45;with&#45;hackers</guid>

      <description><![CDATA[Africa's cybersecurity failures stem less from sophisticated hackers than from insecure system design, weak governance and limited skills, leaving institutions exposed and shifting the challenge from external threats to internal accountability and resilience.]]></description>
      <dc:date>2026-04-12T14:17:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Africa&#8217;s AI Governance Crisis Is Not a Regulatory Gap, It Is a Sovereignty Emergency]]></title>
      <link>https://circleid.com/posts/africas&#45;ai&#45;governance&#45;crisis&#45;is&#45;not&#45;a&#45;regulatory&#45;gap&#45;it&#45;is&#45;a&#45;sovereignty&#45;emergency</link>
      <guid isPermaLink="true">https://circleid.com/posts/africas&#45;ai&#45;governance&#45;crisis&#45;is&#45;not&#45;a&#45;regulatory&#45;gap&#45;it&#45;is&#45;a&#45;sovereignty&#45;emergency</guid>

      <description><![CDATA[Africa's looming AI rules expose a deeper problem: foreign-controlled infrastructure, weak enforcement capacity and externally governed data flows are eroding digital sovereignty, leaving states unable to regulate, protect citizens or meet global obligations.]]></description>
      <dc:date>2026-04-08T09:28:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Trusted Notifier Network (TNN) Core Concept 1: Unfair Cost Transfer and Reversal of Commercial Best]]></title>
      <link>https://circleid.com/posts/trusted&#45;notifier&#45;network&#45;tnn&#45;core&#45;concept&#45;1&#45;unfair&#45;cost&#45;transfer&#45;and&#45;reversal&#45;of&#45;commercial&#45;best</link>
      <guid isPermaLink="true">https://circleid.com/posts/trusted&#45;notifier&#45;network&#45;tnn&#45;core&#45;concept&#45;1&#45;unfair&#45;cost&#45;transfer&#45;and&#45;reversal&#45;of&#45;commercial&#45;best</guid>

      <description><![CDATA[A flawed abuse-response system shifts costs from perpetrators to intermediaries, overwhelming enforcement. The Trusted Notifier Network seeks to realign incentives, curb low-quality reporting, and restore efficiency by embedding trust, accountability, and cost redistribution.]]></description>
      <dc:date>2026-04-07T09:18:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Securing Africa&#8217;s Digital Future: Why Cybersecurity Must Lead Digital Transformation]]></title>
      <link>https://circleid.com/posts/securing&#45;africaas&#45;digital&#45;future&#45;why&#45;cybersecurity&#45;must&#45;lead&#45;digital&#45;transformation</link>
      <guid isPermaLink="true">https://circleid.com/posts/securing&#45;africaas&#45;digital&#45;future&#45;why&#45;cybersecurity&#45;must&#45;lead&#45;digital&#45;transformation</guid>

      <description><![CDATA[Africa's rapid digital expansion, from fintech to e-government, is outpacing its cybersecurity capacity, leaving critical systems exposed and trust at risk unless governments embed security as a core pillar of development across the continent today.]]></description>
      <dc:date>2026-04-06T13:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Securing Digital Brand Borders in a Fragmented World]]></title>
      <link>https://circleid.com/posts/securing&#45;digital&#45;brand&#45;borders&#45;in&#45;a&#45;fragmented&#45;world</link>
      <guid isPermaLink="true">https://circleid.com/posts/securing&#45;digital&#45;brand&#45;borders&#45;in&#45;a&#45;fragmented&#45;world</guid>

      <description><![CDATA[GlobalBlock's expansion into China and Germany signals a shift from reactive brand protection to centralized prevention, as firms seek scalable, cost efficient defences against proliferating AI driven domain abuse worldwide amid a fragmented digital landscape.]]></description>
      <dc:date>2026-03-31T14:29:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Moving Beyond Associated Domain Checks: The Urgent Need to Ban Short-Term Domain Leasing]]></title>
      <link>https://circleid.com/posts/moving&#45;beyond&#45;associated&#45;domain&#45;checks&#45;the&#45;urgent&#45;need&#45;to&#45;ban&#45;short&#45;term&#45;domain&#45;leasing</link>
      <guid isPermaLink="true">https://circleid.com/posts/moving&#45;beyond&#45;associated&#45;domain&#45;checks&#45;the&#45;urgent&#45;need&#45;to&#45;ban&#45;short&#45;term&#45;domain&#45;leasing</guid>

      <description><![CDATA[ICANN's new DNS abuse rules mark progress, yet short-term domain leasing enables fleeting, hard-to-detect attacks. A proposed 30-day minimum lease could curb cybercrime by undermining the economics of weaponised parked domains.]]></description>
      <dc:date>2026-03-31T09:33:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Concerns Over America’s WiFi Router Ban]]></title>
      <link>https://circleid.com/posts/wifi&#45;router&#45;ban</link>
      <guid isPermaLink="true">https://circleid.com/posts/wifi&#45;router&#45;ban</guid>

      <description><![CDATA[America's FCC has barred new foreign-made consumer routers on security grounds, tightening supply for ISPs and households while raising costs and risking technological lag unless domestic manufacturing or approvals quickly expand in coming years significantly.]]></description>
      <dc:date>2026-03-30T13:38:00-07:00</dc:date>
    </item>
  

  </channel>
  

</rss>