Cybersecurity

Sponsored
by

Cybersecurity / Featured Blogs

Google’s Lighthouse Lawsuit - Disrupting the Cybercrime Supply Chain

Google's lawsuit against the Lighthouse phishing syndicate exposes the industrial scale of cybercrime, highlighting how criminals exploit easy access to digital infrastructure to scam millions. The broader supply chain enabling such operations demands urgent reform.

Incremental AI Risk: A Governance Lens for Digital Infrastructure and Public Policy

As artificial intelligence integrates into public infrastructure, it introduces new layers of systemic risk. Policymakers must shift focus from AI's potential to its exposure, applying governance models that reflect these emerging, compound vulnerabilities.

Preparing DNSSEC for the Post-Quantum Era

To prepare DNS security for a post-quantum future, Verisign and partners are testing new cryptographic strategies that balance security, performance, and feasibility, especially through the novel Merkle Tree Ladder mode for managing large signatures.

The Hidden Risks of AI Notetakers: Precaution or Paranoia?

As AI notetakers become common in virtual meetings, concerns grow over data privacy, potential misuse, and the risks of unknowingly sharing sensitive corporate information with unseen third parties beyond organizational control.

eco and AV-Test Publish Monthly topDNS Reports for Internet Service Providers

eco's topDNS initiative and AV-Test are publishing monthly reports to help ISPs detect and mitigate DNS abuse by analysing malware, phishing, and PUA trends, creating a long-term data foundation for industry-wide transparency.

The Public Interest and the Root: Why the Next Round Demands a Public Law Approach to DNS Governance

As ICANN prepares to expand the domain name space, calls grow for a public-law framework to govern the DNS root, ensuring global equity, transparency, and accountability in managing the Internet's core infrastructure.

Centralizing DNS Data for Security, Compliance, and Performance

Private DNS data lakes consolidate fragmented logs into a centralised platform, improving visibility, security, and compliance. They enable advanced analytics, strengthen threat detection, and help organisations optimise network performance in increasingly complex IT environments.

Polish Presidential Veto Threatens Starlink Continuity in Ukraine

Earlier this week, Poland’s new President, Karol Nawrocki, vetoed amendments to the Act on Assistance to Citizens of Ukraine, provoking debate over critical satellite connectivity. Deputy Prime Minister and Minister of Digital Affairs Krzysztof Gawkowski warned that the veto “de facto switched off Starlink for Ukraine,” potentially disrupting connectivity for hospitals, schools, and government operations.

Rethinking Europe’s Cloud Future: Balancing Regulation and Innovation

European efforts to build independent cloud infrastructure face challenges from regulatory overreach and dependence on U.S. cloud providers. Some say that a balanced approach focused on collaboration and flexible standards will be needed to strengthen data sovereignty and foster regional growth. Eighty percent of corporate executives in Germany say that Europe's future prosperity will depend on secure and independent digital infrastructure.

The Latest DNS Threat Landscape: Why CISOs Must Rethink Blocking Strategies

Cybercriminals live by the tenet "If it ain't broke, don't fix it." They'll use the same tactics repeatedly until they no longer work, then switch things up. That's why CISOs and their security teams maintain constant vigilance. Underscoring this, recent analysis of global DNS activity found that new domains continue to be a major tactic for bad actors.