<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  xmlns:admin="http://webns.net/mvcb/"
  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
  xmlns:content="http://purl.org/rss/1.0/modules/content/">

Third segment: whois
  
  <channel>

  <title><![CDATA[CircleID]]></title>
  <link>https://circleid.com/topics/whois</link>
  <description>CircleID - Whois</description>
  <dc:language>en</dc:language>
  <dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
  <dc:date>2026-04-30T19:14:00+00:00</dc:date>

  
    <item>
      <title><![CDATA[Unearthing DNS Facts about UAT-8099]]></title>
      <link>https://circleid.com/posts/unearthing&#45;dns&#45;facts&#45;about&#45;uat&#45;8099</link>
      <guid isPermaLink="true">https://circleid.com/posts/unearthing&#45;dns&#45;facts&#45;about&#45;uat&#45;8099</guid>

      <description><![CDATA[WhoisXML API analysis deepens understanding of the UAT-8099 campaign, uncovering expanded DNS infrastructure, early indicators of malicious intent, and thousands of linked artifacts, underscoring the group's evolving tactics and regional focus across Asia.]]></description>
      <dc:date>2026-04-29T12:21:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[ForceMemo in the DNS Spotlight]]></title>
      <link>https://circleid.com/posts/forcememo&#45;in&#45;the&#45;dns&#45;spotlight</link>
      <guid isPermaLink="true">https://circleid.com/posts/forcememo&#45;in&#45;the&#45;dns&#45;spotlight</guid>

      <description><![CDATA[Researchers tracing the ForceMemo campaign uncover a sprawling DNS footprint, linking compromised GitHub repositories to suspicious domains, shared infrastructure and fresh artifacts, suggesting a coordinated operation that continues to evolve despite partial attribution.]]></description>
      <dc:date>2026-04-23T11:11:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Analysis of the Keenadu Backdoor Network]]></title>
      <link>https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;analysis&#45;of&#45;the&#45;keenadu&#45;backdoor&#45;network</guid>

      <description><![CDATA[Keenadu backdoor embedded in Android firmware exploits supply chains and OTA updates, while DNS analysis of its infrastructure reveals coordinated domains, IP links, and early warning signals pointing to premeditated, scalable cybercriminal operations globally distributed.]]></description>
      <dc:date>2026-04-14T11:36:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A DNS Exploration of Operation Olalampo]]></title>
      <link>https://circleid.com/posts/a&#45;dns&#45;exploration&#45;of&#45;operation&#45;olalampo</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;dns&#45;exploration&#45;of&#45;operation&#45;olalampo</guid>

      <description><![CDATA[MuddyWater's Operation Olalampo targets MENA entities using new malware and Telegram-based control, as DNS analysis uncovers fresh infrastructure, thousands of linked domains, and expanded indicators pointing to a broader, coordinated campaign.]]></description>
      <dc:date>2026-04-10T12:27:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[DNS Deep Dive: LummaStealer + CastleLoader = Larger Threat]]></title>
      <link>https://circleid.com/posts/dns&#45;deep&#45;dive&#45;lummastealer&#45;castleloader&#45;larger&#45;threat</link>
      <guid isPermaLink="true">https://circleid.com/posts/dns&#45;deep&#45;dive&#45;lummastealer&#45;castleloader&#45;larger&#45;threat</guid>

      <description><![CDATA[LummaStealer's revival, paired with CastleLoader, reveals a more evasive malware ecosystem, leveraging obfuscation, DNS agility and vast infrastructure to reach over 100,000 potential victims while spawning hundreds of linked malicious domains and IPs globally observed.]]></description>
      <dc:date>2026-04-07T12:29:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Look Back at 11 of the Red Report 2026 Featured Threats]]></title>
      <link>https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;11&#45;of&#45;the&#45;red&#45;report&#45;2026&#45;featured&#45;threats</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;11&#45;of&#45;the&#45;red&#45;report&#45;2026&#45;featured&#45;threats</guid>

      <description><![CDATA[An analysis of 11 cyber threats from Red Report 2026 reveals how attackers exploit core MITRE ATT&CK techniques, with DNS and IoC data exposing early warning signals, infrastructure scale, and evolving tactics across campaigns globally.]]></description>
      <dc:date>2026-03-31T12:10:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Close Look under the DNS Hood of CoolClient]]></title>
      <link>https://circleid.com/posts/a&#45;close&#45;look&#45;under&#45;the&#45;dns&#45;hood&#45;of&#45;coolclient</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;close&#45;look&#45;under&#45;the&#45;dns&#45;hood&#45;of&#45;coolclient</guid>

      <description><![CDATA[Security researchers trace an updated CoolClient backdoor used by HoneyMyte, uncovering malicious domains, subdomains and IP links, and revealing a wider infrastructure of email and DNS-connected assets tied to data theft operations globally active.]]></description>
      <dc:date>2026-03-24T14:00:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Probing the DNS Depths of PeckBirdy]]></title>
      <link>https://circleid.com/posts/probing&#45;the&#45;dns&#45;depths&#45;of&#45;peckbirdy</link>
      <guid isPermaLink="true">https://circleid.com/posts/probing&#45;the&#45;dns&#45;depths&#45;of&#45;peckbirdy</guid>

      <description><![CDATA[An analysis of DNS and WHOIS data tied to the PeckBirdy C&C framework uncovers expanded infrastructure, linking known IoCs to malicious domains, IPs, and email-connected assets across years of activity.]]></description>
      <dc:date>2026-03-13T10:09:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[What Remains of Black Basta Now That Alleged Gang Leader Joined the Most Wanted List?]]></title>
      <link>https://circleid.com/posts/what&#45;remains&#45;of&#45;black&#45;basta&#45;now&#45;that&#45;alleged&#45;gang&#45;leader&#45;joined&#45;the&#45;most&#45;wanted&#45;list</link>
      <guid isPermaLink="true">https://circleid.com/posts/what&#45;remains&#45;of&#45;black&#45;basta&#45;now&#45;that&#45;alleged&#45;gang&#45;leader&#45;joined&#45;the&#45;most&#45;wanted&#45;list</guid>

      <description><![CDATA[As authorities pursue Black Basta's alleged leader, new analysis of campaign indicators reveals sprawling infrastructure, thousands of linked domains, and persistent ransomware tactics that rely on phishing, known vulnerabilities, and double-extortion pressure.]]></description>
      <dc:date>2026-03-09T10:11:00-07:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Top 10 Malware of Q4 2025: A DNS Deep Dive]]></title>
      <link>https://circleid.com/posts/top&#45;10&#45;malware&#45;of&#45;q4&#45;2025&#45;a&#45;dns&#45;deep&#45;dive</link>
      <guid isPermaLink="true">https://circleid.com/posts/top&#45;10&#45;malware&#45;of&#45;q4&#45;2025&#45;a&#45;dns&#45;deep&#45;dive</guid>

      <description><![CDATA[An analysis of 46 DNS indicators tied to seven of Q4 2025's most prevalent malware families reveals early warning signals, coordinated campaigns and hundreds of connected artifacts, underscoring the predictive power of proactive threat intelligence.]]></description>
      <dc:date>2026-03-02T12:57:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[You Are Invited to Engage in Project Jake: Shaping the Future of DNS Data Governance]]></title>
      <link>https://circleid.com/posts/you&#45;are&#45;invited&#45;to&#45;engage&#45;in&#45;project&#45;jake&#45;shaping&#45;the&#45;future&#45;of&#45;dns&#45;data&#45;governance</link>
      <guid isPermaLink="true">https://circleid.com/posts/you&#45;are&#45;invited&#45;to&#45;engage&#45;in&#45;project&#45;jake&#45;shaping&#45;the&#45;future&#45;of&#45;dns&#45;data&#45;governance</guid>

      <description><![CDATA[Project Jake invites global DNS stakeholders to test JADDAR, a privacy-respecting framework for secure access to registration data, aiming to reduce regulatory fragmentation and modernise domain governance through collaborative, policy-aligned engineering solutions.]]></description>
      <dc:date>2026-02-23T13:14:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[A Look Back at the Top Ransomware Attack Targeting the Salesforce Supply Chain]]></title>
      <link>https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;the&#45;top&#45;ransomware&#45;attack&#45;targeting&#45;the&#45;salesforce&#45;supply&#45;chain</link>
      <guid isPermaLink="true">https://circleid.com/posts/a&#45;look&#45;back&#45;at&#45;the&#45;top&#45;ransomware&#45;attack&#45;targeting&#45;the&#45;salesforce&#45;supply&#45;chain</guid>

      <description><![CDATA[A sprawling ransomware campaign targeting Salesforce's SaaS supply chain topped 2025's breach rankings, exposing millions of records. Fresh DNS analysis uncovered 8,318 linked artifacts, revealing how overlooked indicators foreshadowed widespread, multisector disruption.]]></description>
      <dc:date>2026-02-23T12:57:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[QakBot Named a 2026 Top Malware Threat: An IoC Analysis]]></title>
      <link>https://circleid.com/posts/qakbot&#45;named&#45;a&#45;2026&#45;top&#45;malware&#45;threat&#45;an&#45;ioc&#45;analysis</link>
      <guid isPermaLink="true">https://circleid.com/posts/qakbot&#45;named&#45;a&#45;2026&#45;top&#45;malware&#45;threat&#45;an&#45;ioc&#45;analysis</guid>

      <description><![CDATA[An IoC deep dive into QakBot, newly ranked among 2026's top malware threats, reveals sprawling infrastructure, recycled domains, and fresh artifacts, underscoring how phishing-led access campaigns continue to endanger email-reliant enterprises worldwide.]]></description>
      <dc:date>2026-02-19T11:00:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[The Rise of AI Agent Surface Management (ASM-AI)]]></title>
      <link>https://circleid.com/posts/the&#45;rise&#45;of&#45;ai&#45;agent&#45;surface&#45;management&#45;asm&#45;ai</link>
      <guid isPermaLink="true">https://circleid.com/posts/the&#45;rise&#45;of&#45;ai&#45;agent&#45;surface&#45;management&#45;asm&#45;ai</guid>

      <description><![CDATA[As AI agents gain delegated authority in enterprise systems, they introduce a new security frontier: ASM-AI. The real threat is no longer malicious code, but trusted bots making unsupervised, high-risk decisions.]]></description>
      <dc:date>2026-02-04T13:23:00-08:00</dc:date>
    </item>
  
    <item>
      <title><![CDATA[Probing the DNS Depths of PHALT#BLYX]]></title>
      <link>https://circleid.com/posts/probing&#45;the&#45;dns&#45;depths&#45;of&#45;phaltblyx</link>
      <guid isPermaLink="true">https://circleid.com/posts/probing&#45;the&#45;dns&#45;depths&#45;of&#45;phaltblyx</guid>

      <description><![CDATA[A stealthy phishing campaign known as PHALT#BLYX leveraged fake CAPTCHAs and BSOD screens to deploy DCRat, with forensic analysis uncovering widespread DNS misuse, typosquatting, and more than 21,000 email-connected domains.]]></description>
      <dc:date>2026-02-02T13:37:00-08:00</dc:date>
    </item>
  

  </channel>
  

</rss>