<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: malware
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/malware</link>
  <description>CircleID - Malware</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-05-22T15:06:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[Online Safety and AI]]></title>
      <link>https://circleid.com/posts/online&#45;safety&#45;and&#45;ai</link>
      <guid isPermaLink="true">https://circleid.com/posts/online&#45;safety&#45;and&#45;ai</guid>

      <description><![CDATA[As AI reshapes the digital world, online safety depends on balancing smarter protection with growing risks. From cybersecurity to privacy concerns, understanding AI's role can help users stay secure, informed, and resilient online.]]></description>
      <dc:date>2026-05-21T11:28:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[AI-Driven Cyber Threats Are Growing, Google Warns]]></title>
      <link>https://circleid.com/posts/ai&#45;driven&#45;cyber&#45;threats&#45;are&#45;growing&#45;google&#45;warns</link>
      <guid isPermaLink="true">https://circleid.com/posts/ai&#45;driven&#45;cyber&#45;threats&#45;are&#45;growing&#45;google&#45;warns</guid>

      <description><![CDATA[Google says cybercriminals and state-backed hackers are rapidly adopting generative AI to automate attacks, disguise malware, exploit vulnerabilities and spread disinformation, marking a shift from experimental use to industrial-scale cyber operations across the global threat landscape.]]></description>
      <dc:date>2026-05-12T12:26:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Abuse Is Stealing India&#8217;s Youth: Fake Domains and the Job-Seeking Trap]]></title>
      <link>https://circleid.com/posts/dns&#45;abuse&#45;is&#45;stealing&#45;indias&#45;youth&#45;fake&#45;domains&#45;and&#45;the&#45;job&#45;seeking&#45;trap</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;abuse&#45;is&#45;stealing&#45;indias&#45;youth&#45;fake&#45;domains&#45;and&#45;the&#45;job&#45;seeking&#45;trap</guid>

      <description><![CDATA[Fake recruitment websites exploiting India's young job seekers are proliferating, exposing millions to identity theft, financial fraud and malware while regulators, registrars and digital literacy programs struggle to keep pace with a growing labor market.]]></description>
      <dc:date>2026-05-12T12:09:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Steven Bellovin Takes Aim at Cybersecurity Myths in New Book]]></title>
      <link>https://circleid.com/posts/steven&#45;bellovin&#45;takes&#45;aim&#45;at&#45;cybersecurity&#45;myths&#45;in&#45;new&#45;book</link>
      <guid isPermaLink="true">https://circleid.com/posts/steven&#45;bellovin&#45;takes&#45;aim&#45;at&#45;cybersecurity&#45;myths&#45;in&#45;new&#45;book</guid>

      <description><![CDATA[Cybersecurity pioneer Steven Bellovin's new book strips away jargon and outdated online-safety advice, offering ordinary users practical guidance on passwords, phishing, privacy and digital habits in an era of constant cyber threats and increasingly sophisticated scams.]]></description>
      <dc:date>2026-05-07T12:30:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Iran Targeted by Self-Propagating Malware in Supply-Chain Cyberattacks]]></title>
      <link>https://circleid.com/posts/iran&#45;targeted&#45;by&#45;self&#45;propagating&#45;malware&#45;in&#45;supply&#45;chain&#45;cyberattacks</link>
      <guid isPermaLink="true">https://circleid.com/posts/iran&#45;targeted&#45;by&#45;self&#45;propagating&#45;malware&#45;in&#45;supply&#45;chain&#45;cyberattacks</guid>

      <description><![CDATA[Self-propagating malware hidden in open-source software is targeting Iranian systems, wiping data on infected machines while sparing others, signalling a shift towards precise, politically motivated cyber sabotage through widely trusted digital supply chains.]]></description>
      <dc:date>2026-03-24T12:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[FCC Alert on Cybersecurity Risks]]></title>
      <link>https://circleid.com/posts/fcc&#45;alert&#45;on&#45;cybersecurity&#45;risks</link>
      <guid isPermaLink="true">https://circleid.com/posts/fcc&#45;alert&#45;on&#45;cybersecurity&#45;risks</guid>

      <description><![CDATA[The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning.]]></description>
      <dc:date>2026-03-13T10:19:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Kadnap Malware Infects 14,000 Routers Worldwide, Designed to Resist Takedowns Experts Warn]]></title>
      <link>https://circleid.com/posts/kadnap&#45;malware&#45;infects&#45;14000&#45;routers&#45;worldwide&#45;designed&#45;to&#45;resist&#45;takedowns&#45;experts&#45;warn</link>
      <guid isPermaLink="true">https://circleid.com/posts/kadnap&#45;malware&#45;infects&#45;14000&#45;routers&#45;worldwide&#45;designed&#45;to&#45;resist&#45;takedowns&#45;experts&#45;warn</guid>

      <description><![CDATA[Security researchers have uncovered Kadnap malware infecting more than 14,000 routers worldwide, forming a resilient peer-to-peer botnet that exploits outdated edge devices and could enable covert communications, proxy traffic, and future cyber attacks.]]></description>
      <dc:date>2026-03-12T10:12:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[How Bad Actors Are Leveraging DNS: Looking at the Latest Trends]]></title>
      <link>https://circleid.com/posts/how&#45;bad&#45;actors&#45;are&#45;leveraging&#45;dns&#45;looking&#45;at&#45;the&#45;latest&#45;trends</link>
      <guid isPermaLink="true">https://circleid.com/posts/how&#45;bad&#45;actors&#45;are&#45;leveraging&#45;dns&#45;looking&#45;at&#45;the&#45;latest&#45;trends</guid>

      <description><![CDATA[Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence.]]></description>
      <dc:date>2026-03-11T09:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Top 10 Malware of Q4 2025: A DNS Deep Dive]]></title>
      <link>https://circleid.com/posts/top&#45;10&#45;malware&#45;of&#45;q4&#45;2025&#45;a&#45;dns&#45;deep&#45;dive</link>
      <guid isPermaLink="true">https://circleid.com/posts/top&#45;10&#45;malware&#45;of&#45;q4&#45;2025&#45;a&#45;dns&#45;deep&#45;dive</guid>

      <description><![CDATA[An analysis of 46 DNS indicators tied to seven of Q4 2025's most prevalent malware families reveals early warning signals, coordinated campaigns and hundreds of connected artifacts, underscoring the predictive power of proactive threat intelligence.]]></description>
      <dc:date>2026-03-02T12:57:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Rise of AI Agent Surface Management (ASM-AI)]]></title>
      <link>https://circleid.com/posts/the&#45;rise&#45;of&#45;ai&#45;agent&#45;surface&#45;management&#45;asm&#45;ai</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;rise&#45;of&#45;ai&#45;agent&#45;surface&#45;management&#45;asm&#45;ai</guid>

      <description><![CDATA[As AI agents gain delegated authority in enterprise systems, they introduce a new security frontier: ASM-AI. The real threat is no longer malicious code, but trusted bots making unsupervised, high-risk decisions.]]></description>
      <dc:date>2026-02-04T13:23:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[CSC&#8217;s 2026 Domain Security Report Reveals Escalating Enterprise Risks from Weak Digital Perimeters]]></title>
      <link>https://circleid.com/posts/cscs&#45;2026&#45;domain&#45;security&#45;report&#45;reveals&#45;escalating&#45;enterprise&#45;risks&#45;from&#45;weak&#45;digital&#45;perimeters</link>
      <guid isPermaLink="true">https://circleid.com/posts/cscs&#45;2026&#45;domain&#45;security&#45;report&#45;reveals&#45;escalating&#45;enterprise&#45;risks&#45;from&#45;weak&#45;digital&#45;perimeters</guid>

      <description><![CDATA[CSC's 2026 Domain Security Report reveals persistent vulnerabilities across the Global 2000, with domain-based threats rising and unicorn firms showing mixed security maturity amid growing regulatory pressure and AI-driven cyber risks.]]></description>
      <dc:date>2026-01-27T12:09:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[AI-Powered Malware Evolves: Google Uncovers Live Use of Generative Models in Active Intrusions]]></title>
      <link>https://circleid.com/posts/ai&#45;powered&#45;malware&#45;evolves&#45;google&#45;uncovers&#45;live&#45;use&#45;of&#45;generative&#45;models&#45;in&#45;active&#45;intrusions</link>
      <guid isPermaLink="true">https://circleid.com/posts/ai&#45;powered&#45;malware&#45;evolves&#45;google&#45;uncovers&#45;live&#45;use&#45;of&#45;generative&#45;models&#45;in&#45;active&#45;intrusions</guid>

      <description><![CDATA[Google's Threat Intelligence Group reveals that hackers are integrating AI models directly into malware, enabling live code mutation, stealthier operations, and dynamic payload execution while exploiting AI tools through deceptive prompts and underground marketplaces.]]></description>
      <dc:date>2025-11-06T07:45:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[eco and AV-Test Publish Monthly topDNS Reports for Internet Service Providers]]></title>
      <link>https://circleid.com/posts/eco&#45;and&#45;av&#45;test&#45;publish&#45;monthly&#45;topdns&#45;reports&#45;for&#45;internet&#45;service&#45;providers</link>
      <guid isPermaLink="true">https://circleid.com/posts/eco&#45;and&#45;av&#45;test&#45;publish&#45;monthly&#45;topdns&#45;reports&#45;for&#45;internet&#45;service&#45;providers</guid>

      <description><![CDATA[eco's topDNS initiative and AV-Test are publishing monthly reports to help ISPs detect and mitigate DNS abuse by analysing malware, phishing, and PUA trends, creating a long-term data foundation for industry-wide transparency.]]></description>
      <dc:date>2025-10-15T07:24:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization]]></title>
      <link>https://circleid.com/posts/attaxion&#45;releases&#45;agentless&#45;traffic&#45;monitoring&#45;for&#45;immediate&#45;risk&#45;prioritization</link>
      <guid isPermaLink="true">https://circleid.com/posts/attaxion&#45;releases&#45;agentless&#45;traffic&#45;monitoring&#45;for&#45;immediate&#45;risk&#45;prioritization</guid>

      <description><![CDATA[Attaxion announces the addition of the Agentless Traffic Monitoring capability to its exposure management platform. Agentless Traffic Monitoring is a new capability designed to give cybersecurity teams actionable visibility into network traffic flowing to and from their digital assets -- all without the need to deploy any agents or sensors on these assets.]]></description>
      <dc:date>2025-09-09T06:46:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Top 10 Malware of Q2 2025: A Deep Dive into the IoCs]]></title>
      <link>https://circleid.com/posts/top&#45;10&#45;malware&#45;of&#45;q2&#45;2025&#45;a&#45;deep&#45;dive&#45;into&#45;the&#45;iocs</link>
      <guid isPermaLink="true">https://circleid.com/posts/top&#45;10&#45;malware&#45;of&#45;q2&#45;2025&#45;a&#45;deep&#45;dive&#45;into&#45;the&#45;iocs</guid>

      <description><![CDATA[In the recently published "Top 10 Malware Q2 2025," the Center for Internet Security (CIS) Cyber Threat Intelligence (CTI) Team named the top 10 malware for the quarter, along with their corresponding indicators of compromise (IoCs).]]></description>
      <dc:date>2025-08-26T10:08:00-07:00</dc:date>
    </item>
  

  </channel>
  

</rss>