<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: cybersecurity
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/cybersecurity</link>
  <description>CircleID - Cybersecurity</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-04-30T19:14:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[Unearthing DNS Facts about UAT-8099]]></title>
      <link>https://circleid.com/posts/unearthing&#45;dns&#45;facts&#45;about&#45;uat&#45;8099</link>
      <guid isPermaLink="true">https://circleid.com/posts/unearthing&#45;dns&#45;facts&#45;about&#45;uat&#45;8099</guid>

      <description><![CDATA[WhoisXML API analysis deepens understanding of the UAT-8099 campaign, uncovering expanded DNS infrastructure, early indicators of malicious intent, and thousands of linked artifacts, underscoring the group's evolving tactics and regional focus across Asia.]]></description>
      <dc:date>2026-04-29T12:21:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Beyond Connectivity: How Submarine Cable Resilience Dictates Digital Sovereignty in the Age of Fragmented Governance]]></title>
      <link>https://circleid.com/posts/beyond&#45;connectivity&#45;how&#45;submarine&#45;cable&#45;resilience&#45;dictates&#45;digital&#45;sovereignty&#45;in&#45;the&#45;age&#45;of&#45;fragmented&#45;governance</link>
      <guid isPermaLink="true">https://circleid.com/posts/beyond&#45;connectivity&#45;how&#45;submarine&#45;cable&#45;resilience&#45;dictates&#45;digital&#45;sovereignty&#45;in&#45;the&#45;age&#45;of&#45;fragmented&#45;governance</guid>

      <description><![CDATA[Subsea cables underpin global data flows, yet resilience, control and deep sea access now define digital sovereignty as governance fragments, hyperscalers consolidate ownership, and states prioritize survivability over efficiency in an increasingly contested geopolitical seabed.]]></description>
      <dc:date>2026-04-28T11:25:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Trusted Notifier Network (TNN) Core Concept 2: Building a Chain of Indemnity]]></title>
      <link>https://circleid.com/posts/trusted&#45;notifier&#45;network&#45;tnn&#45;core&#45;concept&#45;2&#45;building&#45;a&#45;chain&#45;of&#45;indemnity</link>
      <guid isPermaLink="true">https://circleid.com/posts/trusted&#45;notifier&#45;network&#45;tnn&#45;core&#45;concept&#45;2&#45;building&#45;a&#45;chain&#45;of&#45;indemnity</guid>

      <description><![CDATA[TNN proposes a contractual chain of indemnity to shift legal risk in global takedowns, replacing patchy statutory protections with enforceable accountability and a fund that makes good-faith action commercially viable for smaller intermediaries.]]></description>
      <dc:date>2026-04-27T13:18:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Africa&#8217;s Community Networks Offer a Local Path to Inclusive and Resilient Connectivity]]></title>
      <link>https://circleid.com/posts/africa&#45;community&#45;networks&#45;offer&#45;a&#45;local&#45;path&#45;to&#45;inclusive&#45;and&#45;resilient&#45;connectivity</link>
      <guid isPermaLink="true">https://circleid.com/posts/africa&#45;community&#45;networks&#45;offer&#45;a&#45;local&#45;path&#45;to&#45;inclusive&#45;and&#45;resilient&#45;connectivity</guid>

      <description><![CDATA[Community networks, locally built and governed, are emerging across Africa as cost-effective tools to extend connectivity, bolster digital sovereignty, and improve cyber resilience, despite regulatory, financial, and technical constraints that hinder broader adoption.]]></description>
      <dc:date>2026-04-27T13:07:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Fake Domains, Real Damage: What the Latest Data Reveals]]></title>
      <link>https://circleid.com/posts/fake&#45;domains&#45;real&#45;damage&#45;what&#45;the&#45;latest&#45;data&#45;reveals</link>
      <guid isPermaLink="true">https://circleid.com/posts/fake&#45;domains&#45;real&#45;damage&#45;what&#45;the&#45;latest&#45;data&#45;reveals</guid>

      <description><![CDATA[Third-party domains exploiting brand names are proliferating, with 88% of homoglyphs externally owned. Many remain dormant yet email-enabled, creating scalable phishing risks as attackers increasingly target trust rather than infrastructure.]]></description>
      <dc:date>2026-04-24T14:57:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[ForceMemo in the DNS Spotlight]]></title>
      <link>https://circleid.com/posts/forcememo&#45;in&#45;the&#45;dns&#45;spotlight</link>
      <guid isPermaLink="true">https://circleid.com/posts/forcememo&#45;in&#45;the&#45;dns&#45;spotlight</guid>

      <description><![CDATA[Researchers tracing the ForceMemo campaign uncover a sprawling DNS footprint, linking compromised GitHub repositories to suspicious domains, shared infrastructure and fresh artifacts, suggesting a coordinated operation that continues to evolve despite partial attribution.]]></description>
      <dc:date>2026-04-23T11:11:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Domain Universe in 2026: AI, Security, Market Maturity, and the New gTLD Frontier]]></title>
      <link>https://circleid.com/posts/the&#45;domain&#45;universe&#45;in&#45;2026&#45;ai&#45;security&#45;market&#45;maturity&#45;and&#45;the&#45;new&#45;gtld&#45;frontier</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;domain&#45;universe&#45;in&#45;2026&#45;ai&#45;security&#45;market&#45;maturity&#45;and&#45;the&#45;new&#45;gtld&#45;frontier</guid>

      <description><![CDATA[Domains enter a mature phase as AI reshapes discovery, security sharpens, and new gTLDs expand. Once simple addresses, they are becoming critical infrastructure for identity, trust, and automated commerce in the evolving web.]]></description>
      <dc:date>2026-04-20T12:32:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[NOGs at a Crossroads: Confronting the New Demands of Network Operations]]></title>
      <link>https://circleid.com/posts/nogs&#45;at&#45;a&#45;crossroads&#45;confronting&#45;the&#45;new&#45;demands&#45;of&#45;network&#45;operations</link>
      <guid isPermaLink="true">https://circleid.com/posts/nogs&#45;at&#45;a&#45;crossroads&#45;confronting&#45;the&#45;new&#45;demands&#45;of&#45;network&#45;operations</guid>

      <description><![CDATA[Surging outages and mounting losses are increasingly forcing a rethink of network operations, as NOGs now confront a shift from technical exchange to strategic governance, where resilience, leadership, and institutional influence define the profession's future.]]></description>
      <dc:date>2026-04-20T12:17:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Domains: The Overlooked Frontline in IP Protection]]></title>
      <link>https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</link>
      <guid isPermaLink="true">https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</guid>

      <description><![CDATA[Domains have quietly become the primary entry point for online IP infringement, yet most firms lack visibility over portfolios, leaving brands exposed and prompting a shift toward integrated, proactive domain governance and security.]]></description>
      <dc:date>2026-04-15T13:22:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Analysis of the Keenadu Backdoor Network]]></title>
      <link>https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</guid>

      <description><![CDATA[Keenadu backdoor embedded in Android firmware exploits supply chains and OTA updates, while DNS analysis of its infrastructure reveals coordinated domains, IP links, and early warning signals pointing to premeditated, scalable cybercriminal operations globally distributed.]]></description>
      <dc:date>2026-04-14T11:36:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Domain Security Report: Unicorns Show Strong Adoption in Key Domain Security Measures]]></title>
      <link>https://circleid.com/posts/domain&#45;security&#45;report&#45;unicorns&#45;show&#45;strong&#45;adoption&#45;in&#45;key&#45;domain&#45;security&#45;measures</link>
      <guid isPermaLink="true">https://circleid.com/posts/domain&#45;security&#45;report&#45;unicorns&#45;show&#45;strong&#45;adoption&#45;in&#45;key&#45;domain&#45;security&#45;measures</guid>

      <description><![CDATA[Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today.]]></description>
      <dc:date>2026-04-13T09:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Why Africa&#8217;s Cybersecurity Problem Has Nothing to Do with Hackers]]></title>
      <link>https://circleid.com/posts/why&#45;africaas&#45;cybersecurity&#45;problem&#45;has&#45;nothing&#45;to&#45;do&#45;with&#45;hackers</link>
      <guid isPermaLink="true">https://circleid.com/posts/why&#45;africaas&#45;cybersecurity&#45;problem&#45;has&#45;nothing&#45;to&#45;do&#45;with&#45;hackers</guid>

      <description><![CDATA[Africa's cybersecurity failures stem less from sophisticated hackers than from insecure system design, weak governance and limited skills, leaving institutions exposed and shifting the challenge from external threats to internal accountability and resilience.]]></description>
      <dc:date>2026-04-12T14:17:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Iran-Linked Cyberattacks Expose Fragility of America’s Industrial Nerve System]]></title>
      <link>https://circleid.com/posts/iran&#45;linked&#45;cyberattacks&#45;expose&#45;fragility&#45;of&#45;americas&#45;industrial&#45;nerve&#45;system</link>
      <guid isPermaLink="true">https://circleid.com/posts/iran&#45;linked&#45;cyberattacks&#45;expose&#45;fragility&#45;of&#45;americas&#45;industrial&#45;nerve&#45;system</guid>

      <description><![CDATA[Iran-linked hackers infiltrated US industrial control systems, disrupting energy and water infrastructure. The attacks highlight systemic vulnerabilities in internet-connected devices and signal an enduring cyber threat despite easing geopolitical tensions.]]></description>
      <dc:date>2026-04-10T12:41:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A DNS Exploration of Operation Olalampo]]></title>
      <link>https://circleid.com/posts/a&#45;dns&#45;exploration&#45;of&#45;operation&#45;olalampo</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;dns&#45;exploration&#45;of&#45;operation&#45;olalampo</guid>

      <description><![CDATA[MuddyWater's Operation Olalampo targets MENA entities using new malware and Telegram-based control, as DNS analysis uncovers fresh infrastructure, thousands of linked domains, and expanded indicators pointing to a broader, coordinated campaign.]]></description>
      <dc:date>2026-04-10T12:27:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Kinetic Frontier: Lessons From Geopolitical Violence and the Bunkerization of AI Infrastructure]]></title>
      <link>https://circleid.com/posts/the&#45;kinetic&#45;frontier&#45;lessons&#45;from&#45;geopolitical&#45;violence&#45;and&#45;the&#45;bunkerization&#45;of&#45;ai&#45;infrastructure</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;kinetic&#45;frontier&#45;lessons&#45;from&#45;geopolitical&#45;violence&#45;and&#45;the&#45;bunkerization&#45;of&#45;ai&#45;infrastructure</guid>

      <description><![CDATA[Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival.]]></description>
      <dc:date>2026-04-08T12:45:00-07:00</dc:date>
    </item>
  

  </channel>
  

</rss>