DNS |
Sponsored by |
The Malaysian government has backtracked on its recent decision to require Internet Service Providers (ISPs) to redirect Domain Name System (DNS) traffic away from third-party servers like Google Public DNS and Cloudflare.
The Internet Corporation for Assigned Names and Numbers (ICANN) has officially reserved the top-level domain ".INTERNAL" for private-use applications. This decision follows years of technical evaluations, public consultations, and inter-organizational discussions.
In a significant escalation against piracy, a French court has ordered Google, Cloudflare, and Cisco to tamper with their DNS resolvers to block access to approximately 117 pirate sports streaming domains.
A DNSSEC failure plunged hundreds of Russian-language websites into darkness on Tuesday evening, rendering .ru and .рф domains inaccessible. The outage affected users both within and outside Russia, with major platforms such as Tinkoff Bank, Avito, Wildberries, Yandex, and MTS experiencing disruptions.
The Internet Corporation for Assigned Names and Numbers (ICANN) is considering the introduction of a new top-level domain (TLD) named .INTERNAL. Unlike traditional TLDs, .INTERNAL is designed exclusively for internal use, akin to the private IPv4 block 192.168.x.x.
ICANN, the organization overseeing the Domain Name System, has announced a $10 million grant initiative to propel projects supporting "the growth of a single, open and globally interoperable Internet." The first application cycle for grants is set to open in March 2024.
The European Union's Network and Information Security Directive (NIS1), introduced in 2016, aimed to strengthen cybersecurity among Member States. However, market fragmentation and growing digital threats led to the enactment of the NIS2 Directive.
New research indicates that the .US top-level domain contains numerous domains linked to a malicious link-shortening service dubbed 'Prolific Puma' promoting malware and phishing. Infoblox has been monitoring this three-year-old service, which uses short domains hosted on uncooperative providers to disguise harmful landing pages.
The Canadian Internet Registration Authority (CIRA) is inviting experienced professionals to join its board and help guide the organization.
A recent report by NS1 provides a comprehensive look at global DNS traffic trends. It reveals that public resolvers dominate the internet, accounting for nearly 60% of recursive DNS usage. Telecom giants represent nearly 9%, with Google the clear front-runner at a little over 30%, followed by Amazon Web Services at 16%.
The EU has been pushing for the development of DNS4EU, a public European DNS resolver with built-in filtering capabilities, as a way to strengthen the "digital sovereignty" of the EU and protect citizens, companies, and public institutions from phishing attacks and malware. In December 2021, a consortium of 13 public and private companies from ten European countries were granted the project to build a public DNS resolution service tailored for the EU.
The DNS Abuse Institute (DNSAI), the entity created by Public Interest Registry (PIR), today announced the launch of NetBeacon, a centralized DNS Abuse reporting service. NetBeacon was developed in collaboration with CleanDNS, an anti-abuse solution developer, which has donated the development and technology behind NetBeacon.
CENTR, which represents European national top-level domain name registries (ccTLDs) such as .si or .eu, has published its comments on the European Commission's DNS abuse study, calling out some of the "misleading analysis and unfortunate conclusions in the study."
A letter sent to ICANN and IANA by a Ukrainian representative to ICANN’s Government Advisory Council (GAC) asks for urgent and strict sanctions against the Russian Federation in “the field of DNS regulation.” The letter urges ICANN to permanently or temporarily revoke Russia’s top-level domains “.ru”, “.рф” and “.su” and to shut down DNS root servers located in Saint Petersburg and Moscow.
New Zealand's .nz operator, InternetNZ, on Wednesday disclosed a vulnerability against authoritative DNS servers. The vulnerability called TsuNAME was first detected in February 2020 in the .nz registry and found that it could be exploited to carry out Denial-of-Service (DoS) attacks across the world.