/ Recently Commented

FCC Alert on Cybersecurity Risks

The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning. more

ICANN Probes “Parked Domains” and Zero-Click Redirects Amid Growing Internet Governance Concerns

ICANN is examining the widespread use of parked domains and zero-click redirection, seeking to understand how automated traffic routing and advertising practices affect transparency, consumer protection and trust in the global domain-name system. more

Kadnap Malware Infects 14,000 Routers Worldwide, Designed to Resist Takedowns Experts Warn

Security researchers have uncovered Kadnap malware infecting more than 14,000 routers worldwide, forming a resilient peer-to-peer botnet that exploits outdated edge devices and could enable covert communications, proxy traffic, and future cyber attacks. more

Iran’s Digital Arsenal: When Invisible Fences Rise in the Conflict

Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today. more

Reflecting on WSIS+20 and Youth’s Role in Redefining Stakeholder Classification

At ICANN85, reflection on WSIS+20 highlights a quieter milestone: youth successfully secured recognition as a distinct stakeholder group, reshaping how Internet governance defines participation and offering a blueprint for other overlooked communities seeking voice today. more

How Bad Actors Are Leveraging DNS: Looking at the Latest Trends

Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence. more

The Rapid Evolution of Transport Lasers

Exploding internet traffic and AI demand are driving a rapid upgrade in fibre transport lasers, from early one gigabit systems to 400, 800 and even 1.6 terabit links reshaping backbone capacity worldwide as networks scale. more

Why DNS-Level Piracy Enforcement Is a Trap

Efforts to combat online piracy are pushing courts to weaponise the Internet's naming system. Turning DNS operators into enforcement agents may deliver quick takedowns, but risks collateral damage, jurisdictional conflict and long-term fragmentation of the Internet. more

Rising Costs of Broadband Construction

Despite steady expansion of fibre networks, the cost of building them is rising. New survey data show labour-heavy construction, higher aerial costs and persistent inflation pressures likely to push deployment expenses higher in 2026. more

Iranians Outsmart Internet Blackout to Broadcast Airstrikes

After US and Israeli strikes, Iran imposed a near-total internet blackout, yet citizens used satellite links and decentralized tools to share footage, undermining state control and exposing a growing contest over information in wartime. more

The AI Effect: Why Brand Impersonation Is Becoming Industrialised

Generative AI has turned brand impersonation from a nuisance into an industrial-scale threat, eroding trust. As ICANN's 2026 round approaches, DotBrand domains promise a structural fix to spoofing that strategies failed to deliver in 2012. more

The Challenge of Adding Fiber to Poles

An FCC ruling in a dispute between Comcast and Appalachian Power clarifies pole attachment cost rules, but exposes how regulatory delays and uncooperative utilities can slow fiber deployment and raise costs for broadband providers. more

The Geopolitical Protocol: Can QUIC and LEO Satellites Mitigate the Risks of Fragile Subsea Cables?

As geopolitical tensions expose the fragility of subsea cables, Low Earth Orbit satellites and the QUIC protocol promise a more resilient internet by diversifying routes, preserving session continuity, and redefining control over global data flows. more

AI: The Squandered Opportunity in India

India's AI summit promised a Global South rethink of digital governance. Instead, a weak declaration and Delhi's accession to America's Pax Silica exposed widening power asymmetries, leaving countries like Brazil outside the real circuitry of control. more

Munich Cybersecurity Conference 2026: Moving Into the Twilight Zone

At Munich's twin security gatherings, leaders warned that cyber conflict, transatlantic rifts and weaponised AI are pushing the rules-based order into a perilous transition, where deterrence falters, norms erode and digital sovereignty trumps multistakeholder ideals. more