Cybersecurity

Sponsored
by

Cybersecurity / Recently Commented

Kadnap Malware Infects 14,000 Routers Worldwide, Designed to Resist Takedowns Experts Warn

Security researchers have uncovered Kadnap malware infecting more than 14,000 routers worldwide, forming a resilient peer-to-peer botnet that exploits outdated edge devices and could enable covert communications, proxy traffic, and future cyber attacks. more

Iran’s Digital Arsenal: When Invisible Fences Rise in the Conflict

Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today. more

How Bad Actors Are Leveraging DNS: Looking at the Latest Trends

Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence. more

The AI Effect: Why Brand Impersonation Is Becoming Industrialised

Generative AI has turned brand impersonation from a nuisance into an industrial-scale threat, eroding trust. As ICANN's 2026 round approaches, DotBrand domains promise a structural fix to spoofing that strategies failed to deliver in 2012. more

Munich Cybersecurity Conference 2026: Moving Into the Twilight Zone

At Munich's twin security gatherings, leaders warned that cyber conflict, transatlantic rifts and weaponised AI are pushing the rules-based order into a perilous transition, where deterrence falters, norms erode and digital sovereignty trumps multistakeholder ideals. more

Iran Expands Digital Dragnet After Crushing Protests

After quelling nationwide protests, Iran has intensified its use of digital surveillance, deploying phone tracking, facial recognition and online monitoring to identify, intimidate and detain dissenters through a vast state-controlled communications infrastructure. more

Domain Security Report: Are Global 2000 Companies Doing Enough on Domain Security?

A six year study of Global 2000 firms finds progress on email authentication but worrying gaps elsewhere. Despite rising DMARC adoption, falling DNS redundancy and uneven regional uptake leave companies exposed to domain based attacks. more

WSIS+20: A Small Light of Hope in a Darkening Political Landscape

Despite deep geopolitical divides, the WSIS+20 outcome document was adopted by consensus, preserving a multistakeholder vision for the digital future while deferring controversial issues to a time more conducive to progress. more

Looking Ahead: ICANN’s Upcoming Policy on DNS Abuse Mitigation

ICANN is finalising a policy to curb DNS abuse, aiming to preserve internet stability while defending freedom of expression. With regulatory pressure mounting, the multistakeholder model faces a critical test. more

Governing the Invisible: AI Risks in Telecom Infrastructure Outpace Global Legal Frameworks

As AI systems take on critical roles in telecommunications, global regulatory frameworks remain outdated and fragmented, leaving essential infrastructure vulnerable to novel risks that current laws on cybersecurity and data protection fail to address. more

NANOG 95: From Faster Fibre to Route Leaks, Operators Face Old Problems with New Tools

The NANOG 95 conference spotlighted breakthroughs in fibre optics, wireless technology, routing security, and quantum computing, offering a forward-looking assessment of internet infrastructure and its vulnerabilities, as reported by APNIC's Geoff Huston. more

Google’s Lighthouse Lawsuit - Disrupting the Cybercrime Supply Chain

Google's lawsuit against the Lighthouse phishing syndicate exposes the industrial scale of cybercrime, highlighting how criminals exploit easy access to digital infrastructure to scam millions. The broader supply chain enabling such operations demands urgent reform. more

AI System Abused in China-Linked Cyberattack, Says Anthropic

A Chinese-linked cyberattack exploited Anthropic's Claude AI to infiltrate global institutions with limited human input, prompting urgent calls for regulation and sparking debate over the growing autonomy of artificial intelligence in digital threats. more

AI-Powered Malware Evolves: Google Uncovers Live Use of Generative Models in Active Intrusions

Google's Threat Intelligence Group reveals that hackers are integrating AI models directly into malware, enabling live code mutation, stealthier operations, and dynamic payload execution while exploiting AI tools through deceptive prompts and underground marketplaces. more

Preparing DNSSEC for the Post-Quantum Era

To prepare DNS security for a post-quantum future, Verisign and partners are testing new cryptographic strategies that balance security, performance, and feasibility, especially through the novel Merkle Tree Ladder mode for managing large signatures. more