<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: threat-intelligence
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/threat-intelligence</link>
  <description>CircleID - Threat Intelligence</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-05-22T15:06:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[Online Safety and AI]]></title>
      <link>https://circleid.com/posts/online&#45;safety&#45;and&#45;ai</link>
      <guid isPermaLink="true">https://circleid.com/posts/online&#45;safety&#45;and&#45;ai</guid>

      <description><![CDATA[As AI reshapes the digital world, online safety depends on balancing smarter protection with growing risks. From cybersecurity to privacy concerns, understanding AI's role can help users stay secure, informed, and resilient online.]]></description>
      <dc:date>2026-05-21T11:28:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Global Domain Activity Trends Seen in Q1 2026]]></title>
      <link>https://circleid.com/posts/global&#45;domain&#45;activity&#45;trends&#45;seen&#45;in&#45;q1&#45;2026</link>
      <guid isPermaLink="true">https://circleid.com/posts/global&#45;domain&#45;activity&#45;trends&#45;seen&#45;in&#45;q1&#45;2026</guid>

      <description><![CDATA[Q1 2026 domain activity showed registrations concentrated in a handful of TLDs, with 6.7 million new domains flagged as malicious, offering fresh insight into global DNS patterns and cybersecurity risks as shifting registration trends reshape.]]></description>
      <dc:date>2026-05-19T11:10:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Iran Threatens Subsea Internet Cables in the Strait of Hormuz]]></title>
      <link>https://circleid.com/posts/iran&#45;threatens&#45;subsea&#45;internet&#45;cables&#45;in&#45;the&#45;strait&#45;of&#45;hormuz</link>
      <guid isPermaLink="true">https://circleid.com/posts/iran&#45;threatens&#45;subsea&#45;internet&#45;cables&#45;in&#45;the&#45;strait&#45;of&#45;hormuz</guid>

      <description><![CDATA[Iran is seeking to monetize and potentially weaponize subsea internet cables beneath the Strait of Hormuz, exposing how modern geopolitical conflicts increasingly threaten the digital infrastructure underpinning global finance, communications and trade.]]></description>
      <dc:date>2026-05-18T13:44:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Procedural Resilience or Technological Rigidity? Reassessing Article 19&#8217;s DNS Abuse Framework in the Post-MLAT Era]]></title>
      <link>https://circleid.com/posts/procedural&#45;resilience&#45;or&#45;technological&#45;rigidity&#45;article&#45;19s&#45;dns&#45;abuse&#45;framework</link>
      <guid isPermaLink="true">https://circleid.com/posts/procedural&#45;resilience&#45;or&#45;technological&#45;rigidity&#45;article&#45;19s&#45;dns&#45;abuse&#45;framework</guid>

      <description><![CDATA[As cross-border cyber enforcement falters, critics argue Article 19's DNS abuse framework prioritizes procedural purity over user protection, leaving courts too slow to counter AI-driven phishing, rapid-flux domains, and increasingly automated online threats.]]></description>
      <dc:date>2026-05-18T12:04:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Look Back at the Top 10 Ransomware of 2025]]></title>
      <link>https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;the&#45;top&#45;10&#45;ransomware&#45;of&#45;2025</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;the&#45;top&#45;10&#45;ransomware&#45;of&#45;2025</guid>

      <description><![CDATA[A retrospective analysis of 2025's top ransomware groups reveals how DNS traces, historical WHOIS records, and network IoCs exposed hidden infrastructure, affiliate activity, and thousands of potential victim connections linked to major cybercriminal operations.]]></description>
      <dc:date>2026-05-13T09:18:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[AI-Driven Cyber Threats Are Growing, Google Warns]]></title>
      <link>https://circleid.com/posts/ai&#45;driven&#45;cyber&#45;threats&#45;are&#45;growing&#45;google&#45;warns</link>
      <guid isPermaLink="true">https://circleid.com/posts/ai&#45;driven&#45;cyber&#45;threats&#45;are&#45;growing&#45;google&#45;warns</guid>

      <description><![CDATA[Google says cybercriminals and state-backed hackers are rapidly adopting generative AI to automate attacks, disguise malware, exploit vulnerabilities and spread disinformation, marking a shift from experimental use to industrial-scale cyber operations across the global threat landscape.]]></description>
      <dc:date>2026-05-12T12:26:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Abuse Is Stealing India&#8217;s Youth: Fake Domains and the Job-Seeking Trap]]></title>
      <link>https://circleid.com/posts/dns&#45;abuse&#45;is&#45;stealing&#45;indias&#45;youth&#45;fake&#45;domains&#45;and&#45;the&#45;job&#45;seeking&#45;trap</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;abuse&#45;is&#45;stealing&#45;indias&#45;youth&#45;fake&#45;domains&#45;and&#45;the&#45;job&#45;seeking&#45;trap</guid>

      <description><![CDATA[Fake recruitment websites exploiting India's young job seekers are proliferating, exposing millions to identity theft, financial fraud and malware while regulators, registrars and digital literacy programs struggle to keep pace with a growing labor market.]]></description>
      <dc:date>2026-05-12T12:09:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Network IoC Analysis for 8 Iran-Affiliated APT Groups]]></title>
      <link>https://circleid.com/posts/a&#45;network&#45;ioc&#45;analysis&#45;for&#45;8&#45;iran&#45;affiliated&#45;apt&#45;groups</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;network&#45;ioc&#45;analysis&#45;for&#45;8&#45;iran&#45;affiliated&#45;apt&#45;groups</guid>

      <description><![CDATA[An analysis of 191 network indicators tied to eight Iran-affiliated APT groups uncovered malicious domains, active infrastructure, thousands of victim-linked IP interactions, and coordinated DNS activity, revealing the breadth and persistence of Tehran-linked cyber operations amid escalating regional tensions.]]></description>
      <dc:date>2026-05-12T09:43:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Steven Bellovin Takes Aim at Cybersecurity Myths in New Book]]></title>
      <link>https://circleid.com/posts/steven&#45;bellovin&#45;takes&#45;aim&#45;at&#45;cybersecurity&#45;myths&#45;in&#45;new&#45;book</link>
      <guid isPermaLink="true">https://circleid.com/posts/steven&#45;bellovin&#45;takes&#45;aim&#45;at&#45;cybersecurity&#45;myths&#45;in&#45;new&#45;book</guid>

      <description><![CDATA[Cybersecurity pioneer Steven Bellovin's new book strips away jargon and outdated online-safety advice, offering ordinary users practical guidance on passwords, phishing, privacy and digital habits in an era of constant cyber threats and increasingly sophisticated scams.]]></description>
      <dc:date>2026-05-07T12:30:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Firms Stick With &#8220;.com&#8221; While Cyber Risks Redefine Domain Strategy]]></title>
      <link>https://circleid.com/posts/firms&#45;stick&#45;with&#45;.com&#45;while&#45;cyber&#45;risks&#45;redefine&#45;domain&#45;strategy</link>
      <guid isPermaLink="true">https://circleid.com/posts/firms&#45;stick&#45;with&#45;.com&#45;while&#45;cyber&#45;risks&#45;redefine&#45;domain&#45;strategy</guid>

      <description><![CDATA[Corporate domain strategies remain anchored in legacy extensions even as new domains proliferate, forcing firms to balance global reach, regional needs and rising fraud risks in an increasingly complex digital landscape.]]></description>
      <dc:date>2026-05-06T11:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Unearthing DNS Facts about UAT-8099]]></title>
      <link>https://circleid.com/posts/unearthing&#45;dns&#45;facts&#45;about&#45;uat&#45;8099</link>
      <guid isPermaLink="true">https://circleid.com/posts/unearthing&#45;dns&#45;facts&#45;about&#45;uat&#45;8099</guid>

      <description><![CDATA[WhoisXML API analysis deepens understanding of the UAT-8099 campaign, uncovering expanded DNS infrastructure, early indicators of malicious intent, and thousands of linked artifacts, underscoring the group's evolving tactics and regional focus across Asia.]]></description>
      <dc:date>2026-04-29T12:21:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[ForceMemo in the DNS Spotlight]]></title>
      <link>https://circleid.com/posts/forcememo&#45;in&#45;the&#45;dns&#45;spotlight</link>
      <guid isPermaLink="true">https://circleid.com/posts/forcememo&#45;in&#45;the&#45;dns&#45;spotlight</guid>

      <description><![CDATA[Researchers tracing the ForceMemo campaign uncover a sprawling DNS footprint, linking compromised GitHub repositories to suspicious domains, shared infrastructure and fresh artifacts, suggesting a coordinated operation that continues to evolve despite partial attribution.]]></description>
      <dc:date>2026-04-23T11:11:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Fixing Geofeed: From Self-Reported Data to Verified Trust]]></title>
      <link>https://circleid.com/posts/fixing&#45;geofeed&#45;from&#45;self&#45;reported&#45;data&#45;to&#45;verified&#45;trust</link>
      <guid isPermaLink="true">https://circleid.com/posts/fixing&#45;geofeed&#45;from&#45;self&#45;reported&#45;data&#45;to&#45;verified&#45;trust</guid>

      <description><![CDATA[Geofeed data, long reliant on unverifiable self-assertions, faces mounting security risks. Integrating RPKI could transform it into a trusted, cryptographically validated infrastructure, strengthening routing integrity, regulatory compliance, and digital sovereignty across an increasingly contested internet.]]></description>
      <dc:date>2026-04-21T11:38:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Domains: The Overlooked Frontline in IP Protection]]></title>
      <link>https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</link>
      <guid isPermaLink="true">https://circleid.com/posts/domains&#45;the&#45;overlooked&#45;frontline&#45;in&#45;ip&#45;protection</guid>

      <description><![CDATA[Domains have quietly become the primary entry point for online IP infringement, yet most firms lack visibility over portfolios, leaving brands exposed and prompting a shift toward integrated, proactive domain governance and security.]]></description>
      <dc:date>2026-04-15T13:22:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Analysis of the Keenadu Backdoor Network]]></title>
      <link>https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</guid>

      <description><![CDATA[Keenadu backdoor embedded in Android firmware exploits supply chains and OTA updates, while DNS analysis of its infrastructure reveals coordinated domains, IP links, and early warning signals pointing to premeditated, scalable cybercriminal operations globally distributed.]]></description>
      <dc:date>2026-04-14T11:36:00-07:00</dc:date>
    </item>
  

  </channel>
  

</rss>