<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: cybersecurity
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/cybersecurity</link>
  <description>CircleID - Cybersecurity</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-04-19T19:59:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[Domains: The Overlooked Frontline in IP Protection]]></title>
      <link>https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</link>
      <guid isPermaLink="true">https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</guid>

      <description><![CDATA[Domains have quietly become the primary entry point for online IP infringement, yet most firms lack visibility over portfolios, leaving brands exposed and prompting a shift toward integrated, proactive domain governance and security.]]></description>
      <dc:date>2026-04-15T13:22:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Analysis of the Keenadu Backdoor Network]]></title>
      <link>https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</guid>

      <description><![CDATA[Keenadu backdoor embedded in Android firmware exploits supply chains and OTA updates, while DNS analysis of its infrastructure reveals coordinated domains, IP links, and early warning signals pointing to premeditated, scalable cybercriminal operations globally distributed.]]></description>
      <dc:date>2026-04-14T11:36:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Domain Security Report: Unicorns Show Strong Adoption in Key Domain Security Measures]]></title>
      <link>https://circleid.com/posts/domain&#45;security&#45;report&#45;unicorns&#45;show&#45;strong&#45;adoption&#45;in&#45;key&#45;domain&#45;security&#45;measures</link>
      <guid isPermaLink="true">https://circleid.com/posts/domain&#45;security&#45;report&#45;unicorns&#45;show&#45;strong&#45;adoption&#45;in&#45;key&#45;domain&#45;security&#45;measures</guid>

      <description><![CDATA[Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today.]]></description>
      <dc:date>2026-04-13T09:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Why Africa&#8217;s Cybersecurity Problem Has Nothing to Do with Hackers]]></title>
      <link>https://circleid.com/posts/why&#45;africaas&#45;cybersecurity&#45;problem&#45;has&#45;nothing&#45;to&#45;do&#45;with&#45;hackers</link>
      <guid isPermaLink="true">https://circleid.com/posts/why&#45;africaas&#45;cybersecurity&#45;problem&#45;has&#45;nothing&#45;to&#45;do&#45;with&#45;hackers</guid>

      <description><![CDATA[Africa's cybersecurity failures stem less from sophisticated hackers than from insecure system design, weak governance and limited skills, leaving institutions exposed and shifting the challenge from external threats to internal accountability and resilience.]]></description>
      <dc:date>2026-04-12T14:17:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Iran-Linked Cyberattacks Expose Fragility of America’s Industrial Nerve System]]></title>
      <link>https://circleid.com/posts/iran&#45;linked&#45;cyberattacks&#45;expose&#45;fragility&#45;of&#45;americas&#45;industrial&#45;nerve&#45;system</link>
      <guid isPermaLink="true">https://circleid.com/posts/iran&#45;linked&#45;cyberattacks&#45;expose&#45;fragility&#45;of&#45;americas&#45;industrial&#45;nerve&#45;system</guid>

      <description><![CDATA[Iran-linked hackers infiltrated US industrial control systems, disrupting energy and water infrastructure. The attacks highlight systemic vulnerabilities in internet-connected devices and signal an enduring cyber threat despite easing geopolitical tensions.]]></description>
      <dc:date>2026-04-10T12:41:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A DNS Exploration of Operation Olalampo]]></title>
      <link>https://circleid.com/posts/a&#45;dns&#45;exploration&#45;of&#45;operation&#45;olalampo</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;dns&#45;exploration&#45;of&#45;operation&#45;olalampo</guid>

      <description><![CDATA[MuddyWater's Operation Olalampo targets MENA entities using new malware and Telegram-based control, as DNS analysis uncovers fresh infrastructure, thousands of linked domains, and expanded indicators pointing to a broader, coordinated campaign.]]></description>
      <dc:date>2026-04-10T12:27:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Kinetic Frontier: Lessons From Geopolitical Violence and the Bunkerization of AI Infrastructure]]></title>
      <link>https://circleid.com/posts/the&#45;kinetic&#45;frontier&#45;lessons&#45;from&#45;geopolitical&#45;violence&#45;and&#45;the&#45;bunkerization&#45;of&#45;ai&#45;infrastructure</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;kinetic&#45;frontier&#45;lessons&#45;from&#45;geopolitical&#45;violence&#45;and&#45;the&#45;bunkerization&#45;of&#45;ai&#45;infrastructure</guid>

      <description><![CDATA[Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival.]]></description>
      <dc:date>2026-04-08T12:45:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Africa&#8217;s AI Governance Crisis Is Not a Regulatory Gap, It Is a Sovereignty Emergency]]></title>
      <link>https://circleid.com/posts/africas&#45;ai&#45;governance&#45;crisis&#45;is&#45;not&#45;a&#45;regulatory&#45;gap&#45;it&#45;is&#45;a&#45;sovereignty&#45;emergency</link>
      <guid isPermaLink="true">https://circleid.com/posts/africas&#45;ai&#45;governance&#45;crisis&#45;is&#45;not&#45;a&#45;regulatory&#45;gap&#45;it&#45;is&#45;a&#45;sovereignty&#45;emergency</guid>

      <description><![CDATA[Africa's looming AI rules expose a deeper problem: foreign-controlled infrastructure, weak enforcement capacity and externally governed data flows are eroding digital sovereignty, leaving states unable to regulate, protect citizens or meet global obligations.]]></description>
      <dc:date>2026-04-08T09:28:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Deep Dive: LummaStealer + CastleLoader = Larger Threat]]></title>
      <link>https://circleid.com/posts/dns&#45;deep&#45;dive&#45;lummastealer&#45;castleloader&#45;larger&#45;threat</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;deep&#45;dive&#45;lummastealer&#45;castleloader&#45;larger&#45;threat</guid>

      <description><![CDATA[LummaStealer's revival, paired with CastleLoader, reveals a more evasive malware ecosystem, leveraging obfuscation, DNS agility and vast infrastructure to reach over 100,000 potential victims while spawning hundreds of linked malicious domains and IPs globally observed.]]></description>
      <dc:date>2026-04-07T12:29:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Trusted Notifier Network (TNN) Core Concept 1: Unfair Cost Transfer and Reversal of Commercial Best]]></title>
      <link>https://circleid.com/posts/trusted&#45;notifier&#45;network&#45;tnn&#45;core&#45;concept&#45;1&#45;unfair&#45;cost&#45;transfer&#45;and&#45;reversal&#45;of&#45;commercial&#45;best</link>
      <guid isPermaLink="true">https://circleid.com/posts/trusted&#45;notifier&#45;network&#45;tnn&#45;core&#45;concept&#45;1&#45;unfair&#45;cost&#45;transfer&#45;and&#45;reversal&#45;of&#45;commercial&#45;best</guid>

      <description><![CDATA[A flawed abuse-response system shifts costs from perpetrators to intermediaries, overwhelming enforcement. The Trusted Notifier Network seeks to realign incentives, curb low-quality reporting, and restore efficiency by embedding trust, accountability, and cost redistribution.]]></description>
      <dc:date>2026-04-07T09:18:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Securing Africa&#8217;s Digital Future: Why Cybersecurity Must Lead Digital Transformation]]></title>
      <link>https://circleid.com/posts/securing&#45;africaas&#45;digital&#45;future&#45;why&#45;cybersecurity&#45;must&#45;lead&#45;digital&#45;transformation</link>
      <guid isPermaLink="true">https://circleid.com/posts/securing&#45;africaas&#45;digital&#45;future&#45;why&#45;cybersecurity&#45;must&#45;lead&#45;digital&#45;transformation</guid>

      <description><![CDATA[Africa's rapid digital expansion, from fintech to e-government, is outpacing its cybersecurity capacity, leaving critical systems exposed and trust at risk unless governments embed security as a core pillar of development across the continent today.]]></description>
      <dc:date>2026-04-06T13:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Securing Digital Brand Borders in a Fragmented World]]></title>
      <link>https://circleid.com/posts/securing&#45;digital&#45;brand&#45;borders&#45;in&#45;a&#45;fragmented&#45;world</link>
      <guid isPermaLink="true">https://circleid.com/posts/securing&#45;digital&#45;brand&#45;borders&#45;in&#45;a&#45;fragmented&#45;world</guid>

      <description><![CDATA[GlobalBlock's expansion into China and Germany signals a shift from reactive brand protection to centralized prevention, as firms seek scalable, cost efficient defences against proliferating AI driven domain abuse worldwide amid a fragmented digital landscape.]]></description>
      <dc:date>2026-03-31T14:29:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Look Back at 11 of the Red Report 2026 Featured Threats]]></title>
      <link>https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;11&#45;of&#45;the&#45;red&#45;report&#45;2026&#45;featured&#45;threats</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;11&#45;of&#45;the&#45;red&#45;report&#45;2026&#45;featured&#45;threats</guid>

      <description><![CDATA[An analysis of 11 cyber threats from Red Report 2026 reveals how attackers exploit core MITRE ATT&CK techniques, with DNS and IoC data exposing early warning signals, infrastructure scale, and evolving tactics across campaigns globally.]]></description>
      <dc:date>2026-03-31T12:10:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Moving Beyond Associated Domain Checks: The Urgent Need to Ban Short-Term Domain Leasing]]></title>
      <link>https://circleid.com/posts/moving&#45;beyond&#45;associated&#45;domain&#45;checks&#45;the&#45;urgent&#45;need&#45;to&#45;ban&#45;short&#45;term&#45;domain&#45;leasing</link>
      <guid isPermaLink="true">https://circleid.com/posts/moving&#45;beyond&#45;associated&#45;domain&#45;checks&#45;the&#45;urgent&#45;need&#45;to&#45;ban&#45;short&#45;term&#45;domain&#45;leasing</guid>

      <description><![CDATA[ICANN's new DNS abuse rules mark progress, yet short-term domain leasing enables fleeting, hard-to-detect attacks. A proposed 30-day minimum lease could curb cybercrime by undermining the economics of weaponised parked domains.]]></description>
      <dc:date>2026-03-31T09:33:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Five Things the UN Permanent Mechanism on Cybersecurity Must Actually Deliver]]></title>
      <link>https://circleid.com/posts/five&#45;things&#45;the&#45;un&#45;permanent&#45;mechanism&#45;on&#45;cybersecurity&#45;must&#45;actually&#45;deliver</link>
      <guid isPermaLink="true">https://circleid.com/posts/five&#45;things&#45;the&#45;un&#45;permanent&#45;mechanism&#45;on&#45;cybersecurity&#45;must&#45;actually&#45;deliver</guid>

      <description><![CDATA[The UN's new permanent cybersecurity mechanism promises continuity after decades of fleeting forums, yet risks irrelevance unless states enforce existing law, bridge cybercrime divides, address AI threats, build practical capacity, and include non-state expertise meaningfully.]]></description>
      <dc:date>2026-03-30T08:48:00-07:00</dc:date>
    </item>
  

  </channel>
  

</rss>