<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: dns-security
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/dns-security</link>
  <description>CircleID - DNS Security</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-04-30T19:14:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[Unearthing DNS Facts about UAT-8099]]></title>
      <link>https://circleid.com/posts/unearthing&#45;dns&#45;facts&#45;about&#45;uat&#45;8099</link>
      <guid isPermaLink="true">https://circleid.com/posts/unearthing&#45;dns&#45;facts&#45;about&#45;uat&#45;8099</guid>

      <description><![CDATA[WhoisXML API analysis deepens understanding of the UAT-8099 campaign, uncovering expanded DNS infrastructure, early indicators of malicious intent, and thousands of linked artifacts, underscoring the group's evolving tactics and regional focus across Asia.]]></description>
      <dc:date>2026-04-29T12:21:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[ForceMemo in the DNS Spotlight]]></title>
      <link>https://circleid.com/posts/forcememo&#45;in&#45;the&#45;dns&#45;spotlight</link>
      <guid isPermaLink="true">https://circleid.com/posts/forcememo&#45;in&#45;the&#45;dns&#45;spotlight</guid>

      <description><![CDATA[Researchers tracing the ForceMemo campaign uncover a sprawling DNS footprint, linking compromised GitHub repositories to suspicious domains, shared infrastructure and fresh artifacts, suggesting a coordinated operation that continues to evolve despite partial attribution.]]></description>
      <dc:date>2026-04-23T11:11:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Domains: The Overlooked Frontline in IP Protection]]></title>
      <link>https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</link>
      <guid isPermaLink="true">https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</guid>

      <description><![CDATA[Domains have quietly become the primary entry point for online IP infringement, yet most firms lack visibility over portfolios, leaving brands exposed and prompting a shift toward integrated, proactive domain governance and security.]]></description>
      <dc:date>2026-04-15T13:22:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Analysis of the Keenadu Backdoor Network]]></title>
      <link>https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</guid>

      <description><![CDATA[Keenadu backdoor embedded in Android firmware exploits supply chains and OTA updates, while DNS analysis of its infrastructure reveals coordinated domains, IP links, and early warning signals pointing to premeditated, scalable cybercriminal operations globally distributed.]]></description>
      <dc:date>2026-04-14T11:36:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Domain Security Report: Unicorns Show Strong Adoption in Key Domain Security Measures]]></title>
      <link>https://circleid.com/posts/domain&#45;security&#45;report&#45;unicorns&#45;show&#45;strong&#45;adoption&#45;in&#45;key&#45;domain&#45;security&#45;measures</link>
      <guid isPermaLink="true">https://circleid.com/posts/domain&#45;security&#45;report&#45;unicorns&#45;show&#45;strong&#45;adoption&#45;in&#45;key&#45;domain&#45;security&#45;measures</guid>

      <description><![CDATA[Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today.]]></description>
      <dc:date>2026-04-13T09:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A DNS Exploration of Operation Olalampo]]></title>
      <link>https://circleid.com/posts/a&#45;dns&#45;exploration&#45;of&#45;operation&#45;olalampo</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;dns&#45;exploration&#45;of&#45;operation&#45;olalampo</guid>

      <description><![CDATA[MuddyWater's Operation Olalampo targets MENA entities using new malware and Telegram-based control, as DNS analysis uncovers fresh infrastructure, thousands of linked domains, and expanded indicators pointing to a broader, coordinated campaign.]]></description>
      <dc:date>2026-04-10T12:27:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Deep Dive: LummaStealer + CastleLoader = Larger Threat]]></title>
      <link>https://circleid.com/posts/dns&#45;deep&#45;dive&#45;lummastealer&#45;castleloader&#45;larger&#45;threat</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;deep&#45;dive&#45;lummastealer&#45;castleloader&#45;larger&#45;threat</guid>

      <description><![CDATA[LummaStealer's revival, paired with CastleLoader, reveals a more evasive malware ecosystem, leveraging obfuscation, DNS agility and vast infrastructure to reach over 100,000 potential victims while spawning hundreds of linked malicious domains and IPs globally observed.]]></description>
      <dc:date>2026-04-07T12:29:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Trusted Notifier Network (TNN) Core Concept 1: Unfair Cost Transfer and Reversal of Commercial Best]]></title>
      <link>https://circleid.com/posts/trusted&#45;notifier&#45;network&#45;tnn&#45;core&#45;concept&#45;1&#45;unfair&#45;cost&#45;transfer&#45;and&#45;reversal&#45;of&#45;commercial&#45;best</link>
      <guid isPermaLink="true">https://circleid.com/posts/trusted&#45;notifier&#45;network&#45;tnn&#45;core&#45;concept&#45;1&#45;unfair&#45;cost&#45;transfer&#45;and&#45;reversal&#45;of&#45;commercial&#45;best</guid>

      <description><![CDATA[A flawed abuse-response system shifts costs from perpetrators to intermediaries, overwhelming enforcement. The Trusted Notifier Network seeks to realign incentives, curb low-quality reporting, and restore efficiency by embedding trust, accountability, and cost redistribution.]]></description>
      <dc:date>2026-04-07T09:18:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Look Back at 11 of the Red Report 2026 Featured Threats]]></title>
      <link>https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;11&#45;of&#45;the&#45;red&#45;report&#45;2026&#45;featured&#45;threats</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;11&#45;of&#45;the&#45;red&#45;report&#45;2026&#45;featured&#45;threats</guid>

      <description><![CDATA[An analysis of 11 cyber threats from Red Report 2026 reveals how attackers exploit core MITRE ATT&CK techniques, with DNS and IoC data exposing early warning signals, infrastructure scale, and evolving tactics across campaigns globally.]]></description>
      <dc:date>2026-03-31T12:10:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Moving Beyond Associated Domain Checks: The Urgent Need to Ban Short-Term Domain Leasing]]></title>
      <link>https://circleid.com/posts/moving&#45;beyond&#45;associated&#45;domain&#45;checks&#45;the&#45;urgent&#45;need&#45;to&#45;ban&#45;short&#45;term&#45;domain&#45;leasing</link>
      <guid isPermaLink="true">https://circleid.com/posts/moving&#45;beyond&#45;associated&#45;domain&#45;checks&#45;the&#45;urgent&#45;need&#45;to&#45;ban&#45;short&#45;term&#45;domain&#45;leasing</guid>

      <description><![CDATA[ICANN's new DNS abuse rules mark progress, yet short-term domain leasing enables fleeting, hard-to-detect attacks. A proposed 30-day minimum lease could curb cybercrime by undermining the economics of weaponised parked domains.]]></description>
      <dc:date>2026-03-31T09:33:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Close Look under the DNS Hood of CoolClient]]></title>
      <link>https://circleid.com/posts/a&#45;close&#45;look&#45;under&#45;the&#45;dns&#45;hood&#45;of&#45;coolclient</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;close&#45;look&#45;under&#45;the&#45;dns&#45;hood&#45;of&#45;coolclient</guid>

      <description><![CDATA[Security researchers trace an updated CoolClient backdoor used by HoneyMyte, uncovering malicious domains, subdomains and IP links, and revealing a wider infrastructure of email and DNS-connected assets tied to data theft operations globally active.]]></description>
      <dc:date>2026-03-24T14:00:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[How DNSXplore Strengthens Internet Trust Across the Global DNSSEC Landscape]]></title>
      <link>https://circleid.com/posts/how&#45;dnsxplore&#45;strengthens&#45;internet&#45;trust&#45;across&#45;the&#45;global&#45;dnssec&#45;landscape</link>
      <guid isPermaLink="true">https://circleid.com/posts/how&#45;dnsxplore&#45;strengthens&#45;internet&#45;trust&#45;across&#45;the&#45;global&#45;dnssec&#45;landscape</guid>

      <description><![CDATA[A once-trusted internet protocol is showing its age. DNSXplore, a global DNSSEC archive, exposes weaknesses, improves diagnostics and nudges adoption, helping secure the cryptographic chain underpinning online trust.]]></description>
      <dc:date>2026-03-19T12:17:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Probing the DNS Depths of PeckBirdy]]></title>
      <link>https://circleid.com/posts/probing&#45;the&#45;dns&#45;depths&#45;of&#45;peckbirdy</link>
      <guid isPermaLink="true">https://circleid.com/posts/probing&#45;the&#45;dns&#45;depths&#45;of&#45;peckbirdy</guid>

      <description><![CDATA[An analysis of DNS and WHOIS data tied to the PeckBirdy C&C framework uncovers expanded infrastructure, linking known IoCs to malicious domains, IPs, and email-connected assets across years of activity.]]></description>
      <dc:date>2026-03-13T10:09:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[How Bad Actors Are Leveraging DNS: Looking at the Latest Trends]]></title>
      <link>https://circleid.com/posts/how&#45;bad&#45;actors&#45;are&#45;leveraging&#45;dns&#45;looking&#45;at&#45;the&#45;latest&#45;trends</link>
      <guid isPermaLink="true">https://circleid.com/posts/how&#45;bad&#45;actors&#45;are&#45;leveraging&#45;dns&#45;looking&#45;at&#45;the&#45;latest&#45;trends</guid>

      <description><![CDATA[Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence.]]></description>
      <dc:date>2026-03-11T09:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[What Remains of Black Basta Now That Alleged Gang Leader Joined the Most Wanted List?]]></title>
      <link>https://circleid.com/posts/what&#45;remains&#45;of&#45;black&#45;basta&#45;now&#45;that&#45;alleged&#45;gang&#45;leader&#45;joined&#45;the&#45;most&#45;wanted&#45;list</link>
      <guid isPermaLink="true">https://circleid.com/posts/what&#45;remains&#45;of&#45;black&#45;basta&#45;now&#45;that&#45;alleged&#45;gang&#45;leader&#45;joined&#45;the&#45;most&#45;wanted&#45;list</guid>

      <description><![CDATA[As authorities pursue Black Basta's alleged leader, new analysis of campaign indicators reveals sprawling infrastructure, thousands of linked domains, and persistent ransomware tactics that rely on phishing, known vulnerabilities, and double-extortion pressure.]]></description>
      <dc:date>2026-03-09T10:11:00-07:00</dc:date>
    </item>
  

  </channel>
  

</rss>