<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: malware
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/malware</link>
  <description>CircleID - Malware</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-04-30T19:14:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[Iran Targeted by Self-Propagating Malware in Supply-Chain Cyberattacks]]></title>
      <link>https://circleid.com/posts/iran&#45;targeted&#45;by&#45;self&#45;propagating&#45;malware&#45;in&#45;supply&#45;chain&#45;cyberattacks</link>
      <guid isPermaLink="true">https://circleid.com/posts/iran&#45;targeted&#45;by&#45;self&#45;propagating&#45;malware&#45;in&#45;supply&#45;chain&#45;cyberattacks</guid>

      <description><![CDATA[Self-propagating malware hidden in open-source software is targeting Iranian systems, wiping data on infected machines while sparing others, signalling a shift towards precise, politically motivated cyber sabotage through widely trusted digital supply chains.]]></description>
      <dc:date>2026-03-24T12:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[FCC Alert on Cybersecurity Risks]]></title>
      <link>https://circleid.com/posts/fcc&#45;alert&#45;on&#45;cybersecurity&#45;risks</link>
      <guid isPermaLink="true">https://circleid.com/posts/fcc&#45;alert&#45;on&#45;cybersecurity&#45;risks</guid>

      <description><![CDATA[The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning.]]></description>
      <dc:date>2026-03-13T10:19:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Kadnap Malware Infects 14,000 Routers Worldwide, Designed to Resist Takedowns Experts Warn]]></title>
      <link>https://circleid.com/posts/kadnap&#45;malware&#45;infects&#45;14000&#45;routers&#45;worldwide&#45;designed&#45;to&#45;resist&#45;takedowns&#45;experts&#45;warn</link>
      <guid isPermaLink="true">https://circleid.com/posts/kadnap&#45;malware&#45;infects&#45;14000&#45;routers&#45;worldwide&#45;designed&#45;to&#45;resist&#45;takedowns&#45;experts&#45;warn</guid>

      <description><![CDATA[Security researchers have uncovered Kadnap malware infecting more than 14,000 routers worldwide, forming a resilient peer-to-peer botnet that exploits outdated edge devices and could enable covert communications, proxy traffic, and future cyber attacks.]]></description>
      <dc:date>2026-03-12T10:12:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[How Bad Actors Are Leveraging DNS: Looking at the Latest Trends]]></title>
      <link>https://circleid.com/posts/how&#45;bad&#45;actors&#45;are&#45;leveraging&#45;dns&#45;looking&#45;at&#45;the&#45;latest&#45;trends</link>
      <guid isPermaLink="true">https://circleid.com/posts/how&#45;bad&#45;actors&#45;are&#45;leveraging&#45;dns&#45;looking&#45;at&#45;the&#45;latest&#45;trends</guid>

      <description><![CDATA[Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence.]]></description>
      <dc:date>2026-03-11T09:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Top 10 Malware of Q4 2025: A DNS Deep Dive]]></title>
      <link>https://circleid.com/posts/top&#45;10&#45;malware&#45;of&#45;q4&#45;2025&#45;a&#45;dns&#45;deep&#45;dive</link>
      <guid isPermaLink="true">https://circleid.com/posts/top&#45;10&#45;malware&#45;of&#45;q4&#45;2025&#45;a&#45;dns&#45;deep&#45;dive</guid>

      <description><![CDATA[An analysis of 46 DNS indicators tied to seven of Q4 2025's most prevalent malware families reveals early warning signals, coordinated campaigns and hundreds of connected artifacts, underscoring the predictive power of proactive threat intelligence.]]></description>
      <dc:date>2026-03-02T12:57:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Rise of AI Agent Surface Management (ASM-AI)]]></title>
      <link>https://circleid.com/posts/the&#45;rise&#45;of&#45;ai&#45;agent&#45;surface&#45;management&#45;asm&#45;ai</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;rise&#45;of&#45;ai&#45;agent&#45;surface&#45;management&#45;asm&#45;ai</guid>

      <description><![CDATA[As AI agents gain delegated authority in enterprise systems, they introduce a new security frontier: ASM-AI. The real threat is no longer malicious code, but trusted bots making unsupervised, high-risk decisions.]]></description>
      <dc:date>2026-02-04T13:23:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[CSC&#8217;s 2026 Domain Security Report Reveals Escalating Enterprise Risks from Weak Digital Perimeters]]></title>
      <link>https://circleid.com/posts/cscs&#45;2026&#45;domain&#45;security&#45;report&#45;reveals&#45;escalating&#45;enterprise&#45;risks&#45;from&#45;weak&#45;digital&#45;perimeters</link>
      <guid isPermaLink="true">https://circleid.com/posts/cscs&#45;2026&#45;domain&#45;security&#45;report&#45;reveals&#45;escalating&#45;enterprise&#45;risks&#45;from&#45;weak&#45;digital&#45;perimeters</guid>

      <description><![CDATA[CSC's 2026 Domain Security Report reveals persistent vulnerabilities across the Global 2000, with domain-based threats rising and unicorn firms showing mixed security maturity amid growing regulatory pressure and AI-driven cyber risks.]]></description>
      <dc:date>2026-01-27T12:09:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[AI-Powered Malware Evolves: Google Uncovers Live Use of Generative Models in Active Intrusions]]></title>
      <link>https://circleid.com/posts/ai&#45;powered&#45;malware&#45;evolves&#45;google&#45;uncovers&#45;live&#45;use&#45;of&#45;generative&#45;models&#45;in&#45;active&#45;intrusions</link>
      <guid isPermaLink="true">https://circleid.com/posts/ai&#45;powered&#45;malware&#45;evolves&#45;google&#45;uncovers&#45;live&#45;use&#45;of&#45;generative&#45;models&#45;in&#45;active&#45;intrusions</guid>

      <description><![CDATA[Google's Threat Intelligence Group reveals that hackers are integrating AI models directly into malware, enabling live code mutation, stealthier operations, and dynamic payload execution while exploiting AI tools through deceptive prompts and underground marketplaces.]]></description>
      <dc:date>2025-11-06T07:45:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[eco and AV-Test Publish Monthly topDNS Reports for Internet Service Providers]]></title>
      <link>https://circleid.com/posts/eco&#45;and&#45;av&#45;test&#45;publish&#45;monthly&#45;topdns&#45;reports&#45;for&#45;internet&#45;service&#45;providers</link>
      <guid isPermaLink="true">https://circleid.com/posts/eco&#45;and&#45;av&#45;test&#45;publish&#45;monthly&#45;topdns&#45;reports&#45;for&#45;internet&#45;service&#45;providers</guid>

      <description><![CDATA[eco's topDNS initiative and AV-Test are publishing monthly reports to help ISPs detect and mitigate DNS abuse by analysing malware, phishing, and PUA trends, creating a long-term data foundation for industry-wide transparency.]]></description>
      <dc:date>2025-10-15T07:24:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization]]></title>
      <link>https://circleid.com/posts/attaxion&#45;releases&#45;agentless&#45;traffic&#45;monitoring&#45;for&#45;immediate&#45;risk&#45;prioritization</link>
      <guid isPermaLink="true">https://circleid.com/posts/attaxion&#45;releases&#45;agentless&#45;traffic&#45;monitoring&#45;for&#45;immediate&#45;risk&#45;prioritization</guid>

      <description><![CDATA[Attaxion announces the addition of the Agentless Traffic Monitoring capability to its exposure management platform. Agentless Traffic Monitoring is a new capability designed to give cybersecurity teams actionable visibility into network traffic flowing to and from their digital assets -- all without the need to deploy any agents or sensors on these assets.]]></description>
      <dc:date>2025-09-09T06:46:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Top 10 Malware of Q2 2025: A Deep Dive into the IoCs]]></title>
      <link>https://circleid.com/posts/top&#45;10&#45;malware&#45;of&#45;q2&#45;2025&#45;a&#45;deep&#45;dive&#45;into&#45;the&#45;iocs</link>
      <guid isPermaLink="true">https://circleid.com/posts/top&#45;10&#45;malware&#45;of&#45;q2&#45;2025&#45;a&#45;deep&#45;dive&#45;into&#45;the&#45;iocs</guid>

      <description><![CDATA[In the recently published "Top 10 Malware Q2 2025," the Center for Internet Security (CIS) Cyber Threat Intelligence (CTI) Team named the top 10 malware for the quarter, along with their corresponding indicators of compromise (IoCs).]]></description>
      <dc:date>2025-08-26T10:08:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Four Steps to Mitigate Subdomain Hijacking]]></title>
      <link>https://circleid.com/posts/20240806&#45;four&#45;steps&#45;to&#45;mitigate&#45;subdomain&#45;hijacking</link>
      <guid isPermaLink="true">https://circleid.com/posts/20240806&#45;four&#45;steps&#45;to&#45;mitigate&#45;subdomain&#45;hijacking</guid>

      <description><![CDATA[The journey towards widespread Cloud adoption has significantly impacted domain name system (DNS) management practices. Initially, businesses operated their own data centers, however the shift towards external hosting providers has introduced complexities and increased the potential for DNS record mismanagement, and therefore, subdomain vulnerability.]]></description>
      <dc:date>2024-08-06T12:23:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[An Unnatural .Bond: A Study of a &#8216;Megacluster&#8217; of Malware Domains]]></title>
      <link>https://circleid.com/posts/20240723&#45;an&#45;unnatural&#45;dot&#45;bond&#45;a&#45;study&#45;of&#45;a&#45;megacluster&#45;of&#45;malware&#45;domains</link>
      <guid isPermaLink="true">https://circleid.com/posts/20240723&#45;an&#45;unnatural&#45;dot&#45;bond&#45;a&#45;study&#45;of&#45;a&#45;megacluster&#45;of&#45;malware&#45;domains</guid>

      <description><![CDATA[A recent news story, following research from security provider Infoblox, highlighted the case of the 'Revolver Rabbit' cybercriminal gang, who have registered more than half-a-million domains to be used for the distribution of information-stealing malware. The gang make use of automated algorithms to register their domains, but unlike the long, pseudo-random ('high entropy') domain names frequently associated with such tools, the Revolver Rabbit domains instead tend to consist of hyphen-separated dictionary words (presumably so as to obfuscate their true purpose), with a string of digits at the end.]]></description>
      <dc:date>2024-07-23T11:14:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[South Korean Telecom Giant KT Corporation Accused of Infecting 600,000 Users with Malware Over Torrent Use]]></title>
      <link>https://circleid.com/posts/20240701&#45;south&#45;korean&#45;telecom&#45;giant&#45;kt&#45;corporation&#45;accused&#45;of&#45;infecting&#45;600000&#45;users&#45;with&#45;malware&#45;over&#45;torrent&#45;use</link>
      <guid isPermaLink="true">https://circleid.com/posts/20240701&#45;south&#45;korean&#45;telecom&#45;giant&#45;kt&#45;corporation&#45;accused&#45;of&#45;infecting&#45;600000&#45;users&#45;with&#45;malware&#45;over&#45;torrent&#45;use</guid>

      <description><![CDATA[South Korean telecom giant KT Corporation has been implicated in deliberately infecting over 600,000 users with malware due to their use of torrent services, as reported by JTBC.]]></description>
      <dc:date>2024-07-01T12:32:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Mystery Malware Takes Down 600,000 Windstream Routers in Coordinated Attack]]></title>
      <link>https://circleid.com/posts/20240530&#45;mystery&#45;malware&#45;takes&#45;down&#45;600000&#45;windstream&#45;routers&#45;in&#45;coordinated&#45;attack</link>
      <guid isPermaLink="true">https://circleid.com/posts/20240530&#45;mystery&#45;malware&#45;takes&#45;down&#45;600000&#45;windstream&#45;routers&#45;in&#45;coordinated&#45;attack</guid>

      <description><![CDATA[In late October, subscribers of Windstream's Kinetic broadband service reported widespread router failures, affecting approximately 600,000 devices across 18 states. Users flooded online forums with complaints, noting their ActionTec T3200 routers displayed a persistent red light and were unresponsive to resets.]]></description>
      <dc:date>2024-05-30T10:39:00-07:00</dc:date>
    </item>
  

  </channel>
  

</rss>