<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: cybersecurity
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/cybersecurity</link>
  <description>CircleID - Cybersecurity</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-05-22T15:06:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[Online Safety and AI]]></title>
      <link>https://circleid.com/posts/online&#45;safety&#45;and&#45;ai</link>
      <guid isPermaLink="true">https://circleid.com/posts/online&#45;safety&#45;and&#45;ai</guid>

      <description><![CDATA[As AI reshapes the digital world, online safety depends on balancing smarter protection with growing risks. From cybersecurity to privacy concerns, understanding AI's role can help users stay secure, informed, and resilient online.]]></description>
      <dc:date>2026-05-21T11:28:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Fake News and Online Safety: Combating Disinformation in the Digital Age]]></title>
      <link>https://circleid.com/posts/fake&#45;news&#45;and&#45;online&#45;safety&#45;combating&#45;disinformation&#45;in&#45;the&#45;digital&#45;age</link>
      <guid isPermaLink="true">https://circleid.com/posts/fake&#45;news&#45;and&#45;online&#45;safety&#45;combating&#45;disinformation&#45;in&#45;the&#45;digital&#45;age</guid>

      <description><![CDATA[Fake news spreads quickly online, fueling distrust, manipulation, and conflict. As AI-generated content grows more sophisticated, media literacy, fact-checking, and vigilance are essential to protecting online safety and preserving trust in information.]]></description>
      <dc:date>2026-05-20T09:26:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Global Domain Activity Trends Seen in Q1 2026]]></title>
      <link>https://circleid.com/posts/global&#45;domain&#45;activity&#45;trends&#45;seen&#45;in&#45;q1&#45;2026</link>
      <guid isPermaLink="true">https://circleid.com/posts/global&#45;domain&#45;activity&#45;trends&#45;seen&#45;in&#45;q1&#45;2026</guid>

      <description><![CDATA[Q1 2026 domain activity showed registrations concentrated in a handful of TLDs, with 6.7 million new domains flagged as malicious, offering fresh insight into global DNS patterns and cybersecurity risks as shifting registration trends reshape.]]></description>
      <dc:date>2026-05-19T11:10:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Iran Threatens Subsea Internet Cables in the Strait of Hormuz]]></title>
      <link>https://circleid.com/posts/iran&#45;threatens&#45;subsea&#45;internet&#45;cables&#45;in&#45;the&#45;strait&#45;of&#45;hormuz</link>
      <guid isPermaLink="true">https://circleid.com/posts/iran&#45;threatens&#45;subsea&#45;internet&#45;cables&#45;in&#45;the&#45;strait&#45;of&#45;hormuz</guid>

      <description><![CDATA[Iran is seeking to monetize and potentially weaponize subsea internet cables beneath the Strait of Hormuz, exposing how modern geopolitical conflicts increasingly threaten the digital infrastructure underpinning global finance, communications and trade.]]></description>
      <dc:date>2026-05-18T13:44:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Procedural Resilience or Technological Rigidity? Reassessing Article 19&#8217;s DNS Abuse Framework in the Post-MLAT Era]]></title>
      <link>https://circleid.com/posts/procedural&#45;resilience&#45;or&#45;technological&#45;rigidity&#45;article&#45;19s&#45;dns&#45;abuse&#45;framework</link>
      <guid isPermaLink="true">https://circleid.com/posts/procedural&#45;resilience&#45;or&#45;technological&#45;rigidity&#45;article&#45;19s&#45;dns&#45;abuse&#45;framework</guid>

      <description><![CDATA[As cross-border cyber enforcement falters, critics argue Article 19's DNS abuse framework prioritizes procedural purity over user protection, leaving courts too slow to counter AI-driven phishing, rapid-flux domains, and increasingly automated online threats.]]></description>
      <dc:date>2026-05-18T12:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Africa&#8217;s Data Sovereignty Challenge: Who Really Controls the Continent&#8217;s Digital Future?]]></title>
      <link>https://circleid.com/posts/africaas&#45;data&#45;sovereignty&#45;challenge&#45;who&#45;really&#45;controls&#45;the&#45;continentas&#45;digital&#45;future</link>
      <guid isPermaLink="true">https://circleid.com/posts/africaas&#45;data&#45;sovereignty&#45;challenge&#45;who&#45;really&#45;controls&#45;the&#45;continentas&#45;digital&#45;future</guid>

      <description><![CDATA[As Africa digitises rapidly, control over data is emerging as a strategic contest. Foreign infrastructure dominance exposes economic and cybersecurity vulnerabilities, pushing governments to prioritise digital capability, regional cooperation, and stronger sovereignty over the systems powering the continent's future.]]></description>
      <dc:date>2026-05-17T12:23:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Look Back at the Top 10 Ransomware of 2025]]></title>
      <link>https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;the&#45;top&#45;10&#45;ransomware&#45;of&#45;2025</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;the&#45;top&#45;10&#45;ransomware&#45;of&#45;2025</guid>

      <description><![CDATA[A retrospective analysis of 2025's top ransomware groups reveals how DNS traces, historical WHOIS records, and network IoCs exposed hidden infrastructure, affiliate activity, and thousands of potential victim connections linked to major cybercriminal operations.]]></description>
      <dc:date>2026-05-13T09:18:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[AI-Driven Cyber Threats Are Growing, Google Warns]]></title>
      <link>https://circleid.com/posts/ai&#45;driven&#45;cyber&#45;threats&#45;are&#45;growing&#45;google&#45;warns</link>
      <guid isPermaLink="true">https://circleid.com/posts/ai&#45;driven&#45;cyber&#45;threats&#45;are&#45;growing&#45;google&#45;warns</guid>

      <description><![CDATA[Google says cybercriminals and state-backed hackers are rapidly adopting generative AI to automate attacks, disguise malware, exploit vulnerabilities and spread disinformation, marking a shift from experimental use to industrial-scale cyber operations across the global threat landscape.]]></description>
      <dc:date>2026-05-12T12:26:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Abuse Is Stealing India&#8217;s Youth: Fake Domains and the Job-Seeking Trap]]></title>
      <link>https://circleid.com/posts/dns&#45;abuse&#45;is&#45;stealing&#45;indias&#45;youth&#45;fake&#45;domains&#45;and&#45;the&#45;job&#45;seeking&#45;trap</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;abuse&#45;is&#45;stealing&#45;indias&#45;youth&#45;fake&#45;domains&#45;and&#45;the&#45;job&#45;seeking&#45;trap</guid>

      <description><![CDATA[Fake recruitment websites exploiting India's young job seekers are proliferating, exposing millions to identity theft, financial fraud and malware while regulators, registrars and digital literacy programs struggle to keep pace with a growing labor market.]]></description>
      <dc:date>2026-05-12T12:09:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Network IoC Analysis for 8 Iran-Affiliated APT Groups]]></title>
      <link>https://circleid.com/posts/a&#45;network&#45;ioc&#45;analysis&#45;for&#45;8&#45;iran&#45;affiliated&#45;apt&#45;groups</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;network&#45;ioc&#45;analysis&#45;for&#45;8&#45;iran&#45;affiliated&#45;apt&#45;groups</guid>

      <description><![CDATA[An analysis of 191 network indicators tied to eight Iran-affiliated APT groups uncovered malicious domains, active infrastructure, thousands of victim-linked IP interactions, and coordinated DNS activity, revealing the breadth and persistence of Tehran-linked cyber operations amid escalating regional tensions.]]></description>
      <dc:date>2026-05-12T09:43:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Illusion of Digital Sovereignty (Part II) - Emergence, Sovereign AI Ecosystem, the RIR System, Number Resources]]></title>
      <link>https://circleid.com/posts/the&#45;illusion&#45;of&#45;digital&#45;sovereignty&#45;part&#45;ii</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;illusion&#45;of&#45;digital&#45;sovereignty&#45;part&#45;ii</guid>

      <description><![CDATA[As states chase digital sovereignty through clouds, AI and localized infrastructure, the internet's globally coordinated foundations reveal a harder truth: operational continuity depends less on control than on interoperable systems built on trust and governance.]]></description>
      <dc:date>2026-05-11T12:31:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Recent Advancements in the Rights to Public Knowledge: Technical Standards]]></title>
      <link>https://circleid.com/posts/recent&#45;advancements&#45;in&#45;the&#45;rights&#45;to&#45;public&#45;knowledge&#45;technical&#45;standards</link>
      <guid isPermaLink="true">https://circleid.com/posts/recent&#45;advancements&#45;in&#45;the&#45;rights&#45;to&#45;public&#45;knowledge&#45;technical&#45;standards</guid>

      <description><![CDATA[Recent court rulings in Europe and America are reshaping access to technical standards, weakening paywalls and strengthening the principle that publicly mandated knowledge belongs to citizens, regulators and increasingly AI systems that depend on machine-readable information.]]></description>
      <dc:date>2026-05-11T11:32:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Steven Bellovin Takes Aim at Cybersecurity Myths in New Book]]></title>
      <link>https://circleid.com/posts/steven&#45;bellovin&#45;takes&#45;aim&#45;at&#45;cybersecurity&#45;myths&#45;in&#45;new&#45;book</link>
      <guid isPermaLink="true">https://circleid.com/posts/steven&#45;bellovin&#45;takes&#45;aim&#45;at&#45;cybersecurity&#45;myths&#45;in&#45;new&#45;book</guid>

      <description><![CDATA[Cybersecurity pioneer Steven Bellovin's new book strips away jargon and outdated online-safety advice, offering ordinary users practical guidance on passwords, phishing, privacy and digital habits in an era of constant cyber threats and increasingly sophisticated scams.]]></description>
      <dc:date>2026-05-07T12:30:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Firms Stick With &#8220;.com&#8221; While Cyber Risks Redefine Domain Strategy]]></title>
      <link>https://circleid.com/posts/firms&#45;stick&#45;with&#45;.com&#45;while&#45;cyber&#45;risks&#45;redefine&#45;domain&#45;strategy</link>
      <guid isPermaLink="true">https://circleid.com/posts/firms&#45;stick&#45;with&#45;.com&#45;while&#45;cyber&#45;risks&#45;redefine&#45;domain&#45;strategy</guid>

      <description><![CDATA[Corporate domain strategies remain anchored in legacy extensions even as new domains proliferate, forcing firms to balance global reach, regional needs and rising fraud risks in an increasingly complex digital landscape.]]></description>
      <dc:date>2026-05-06T11:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Africa&#8217;s Digital Transformation Is Outpacing Its Cybersecurity Governance]]></title>
      <link>https://circleid.com/posts/africaas&#45;digital&#45;transformation&#45;is&#45;outpacing&#45;its&#45;cybersecurity&#45;governance</link>
      <guid isPermaLink="true">https://circleid.com/posts/africaas&#45;digital&#45;transformation&#45;is&#45;outpacing&#45;its&#45;cybersecurity&#45;governance</guid>

      <description><![CDATA[Africa's digital boom is accelerating, but safeguards lag. Governments and firms deploy systems at speed, while weak enforcement and fragmented oversight leave economies exposed to mounting cyber risks.]]></description>
      <dc:date>2026-05-04T11:51:00-07:00</dc:date>
    </item>
  

  </channel>
  

</rss>