The international community has long struggled with the challenge of translating international law into actionable norms and practices in cyberspace. The conclusion of the United Nations Open-Ended Working Group (OEWG) on the security of and in the use of information and communications technologies 2021-2025 marks a vital milestone in that ongoing process. more
This study analyzes the differences in domain name and IP address strategies among a number of current mainstream artificial intelligence (AI) service providers. We find that these technical choices not only reflect deployment decisions but also deep-seated corporate knowledge and capabilities in Internet infrastructure service provision, as well as brand positioning and market strategies. more
We've had a quiet policy change in the United States over the last year, where satellite broadband is starting to be considered broadband by the federal government. Any rural household that subscribes to and loves Starlink would wonder why this is news, but from a policy perspective, it is a big deal. I've been considering what this shift might mean in the future. The FCC decided that Starlink wasn't broadband when it rejected Starlink's long-form filing in August 2022, where Starlink wanted to claim the funding it had won in the RDOF reverse auction. more
Two sets of authors sued Anthropic and Meta in San Francisco for copyright infringement, arguing that the companies had pirated their works to train their LLMs. Everyone agreed that a key question was whether fair use allowed it, and in both cases, the courts looked at the fair use issue before dealing with other aspects of the cases. Even though the facts in both cases were very similar, last week, two judges in the same court wrote opinions, coming to very different conclusions. How can that happen? Is fair use broken? more
At the 20th Internet Governance Forum in Lillestrøm, Norway, the UN Internet Governance Forum's dynamic coalition Internet Standards, Security and Safety (IS3C) released its new report on post-quantum policies. This report presents the findings of a collaborative study undertaken by IS3C and the French domain name registry Afnic and examines the critical need for Post-Quantum Cryptography (PQC) to achieve greater security in the ever-expanding global IoT landscape. more
As published on June 24, 2025, it is with no surprise that the AFNIC was renewed as the backend registry provider of the .PARIS new generic Top-Level Domain. What caught my attention in the announcement was this paragraph: “Afnic’s remit will also be expanded to include communication and promotion of the .paris TLD, as well as the development of initiatives designed to increase its adoption by businesses and private individuals.” more
An international institutional battle of sorts has been playing out in a segment of the trade press over the past couple of weeks over the venue of the Oct 2027 World Radiocommunication Conference (WRC-27). The treaty conference held under the auspices of the International Telecommunication Union (ITU) Radiocommunication Sector is part of a continuum of intergovernmental activities that began in Berlin in 1903. more
Networks are typically built to provide certain services at an expected scale. The rationale for this focused objective is entirely reasonable: to overachieve would be inefficient and costly. So, we build service infrastructure to a level of sufficient capability to meet expectations and no more. In ideal conditions, this leads to a widely deployed and highly efficient infrastructure that is capable of supporting a single service profile. more
Elon Musk assured us that he would not stop the Starlink service in Ukraine. But, given his feud with Trump, his criticism of President Zelensky, and his rash actions with DOGE, can he be trusted? (His termination of USAID is estimated to have resulted in 340,000 deaths so far.) When askedabout Musk's influence, Josef Aschbacher, director general of the European Space Agency, said he declined to comment on "the internal politics of the United States and who should influence these decisions" but added "If changes happen and if our US partners and friends are changing their plans, of course we will be ready for plan B. more
As the global digital order enters an era of intensifying geopolitical tension, debates over digital sovereignty have re-emerged as a defining fault line in Internet governance. At stake is not merely who controls data or infrastructure within national borders but whether the vision of a globally interoperable, open Internet, one of WSIS's founding principles, can be meaningfully sustained. more
The final phase of the WSIS+20 review has started. The two co-facilitators, Ambassador Suela Janina from Albania and Ambassador Ekitela Lokaale from Kenia, published on May, 21, 2025, their road map. The WSIS+20 Roadmap will lead us to the WSIS High-Level Meeting of the UN General Assembly (UNGA), scheduled for New York at the UN HQ on December 16-17, 2025. The first intergovernmental consultations were held on May 30, 2025, in New York. Two online stakeholder consultations followed on June 9 & 10, 2025. more
The future of the World Summit on the Information Society (WSIS) process will be one of the main topics of the 2025 Internet Governance Forum. Many in the IG community are heavily invested in the renewal of WSIS. They imply that if it is not renewed, there will be major, negative effects on the way we govern the Internet. IGP believes that it is healthy and productive for the community to consider the possibility of ending WSIS. more
Low-orbit space is growing increasingly crowded. Starlink has over 7,100 satellites in orbit and has plans to grow to 30,000. Project Kuiper has plans for a constellation of 3,232 satellites. One Web's first-generation constellation has 648 satellites, with plans to grow to over 6,300 satellites. The Thousand Sails (Qianfan) constellation is planning for up to 15,000 satellites. Numerous countries and businesses are launching or planning for smaller constellations for a wide variety of purposes.
more
The ICANN Board's recent resolution to suspend an accountability safeguard hardcoded in its bylaws may represent the final straw that breaks the community's trust in ICANN. Most community members, including its own Board Chair, acknowledge that its current policy development and implementation processes are not working efficiently. However, the Board's decision to suspend the mechanism that could address these inefficiencies only seeks to preserve the status quo and the economic interests of these dominant market participants. more
We have just released the 2025 edition of the DOTZON study "Digital City Brands." Since first presenting the study in early 2017, DOTZON has now analyzed for the ninth consecutive year how cities successfully use their Digital City Brands. The Digital City Brand represents the digital aspect of a city's brand and reflects how digitally advanced a city is. The emergence of the Internet was the reason Digital City Brands were created in the first place. more
What happens when governments don't just regulate content, but forcibly repurpose the very guts of the Internet's infrastructure to enforce their policies? The chilling answer, increasingly evident worldwide, is widespread, devastating collateral damage. Around the world, neutral systems like Domain Name System (DNS) resolvers and IP routing, the bedrock of our digital lives, are being weaponized as enforcement tools. more
Competition has been creeping into broadband pricing for the last several years as cable companies have been using low introductory rates to try to win new customers and offering similarly low prices to try to keep them. Anybody who competes against the big cable companies will tell you that cable companies have been competing for years by offering two-year promotional prices to keep customers. However, competition might have gone into a new gear recently... more
The NetBeacon Institute is pleased to publish its White Paper: Proposal for PDPs on DNS Abuse. We created this paper to support and advance ICANN Community discussions on potential policy development related to DNS Abuse. From our unique perspective, we believe there are a number of issues that are constrained enough to be a successful ICANN PDP and can make a meaningful difference in our collective work against DNS Abuse. more
On 17 May 1865, 20 European states convened to establish the International Telecommunication Union (ITU) to streamline the clunky process of sending telegraph messages across borders. 160 years later, ITU's anniversary is more than a mere commemorative moment; it is a stark reminder that multilateral cooperation is beneficial and necessary in our increasingly interconnected world. more
The ability to rank results according to the level of threat they pose (based on factors such as, for example, the extent to which a webpage relates to a brand of interest) is a key component of many brand protection services. The prioritisation process has a number of purposes, including the identification of: (a) priority targets for further analysis; (b) candidates for content tracking (i.e. regular reinspection of content or configuration, and the generation of an alert if high-concern findings are identified) - as may be appropriate in cases where a domain name presents a high potential level of risk but is not currently associated with any live site content; and (c) priority targets for enforcement actions. more
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byVerisign
The Federal Bureau of Investigation (FBI) issued a FLASH report to disseminate indicators of compromise (IoCs) for the Funnull infrastructure that threat actors used to manage domains related to cryptocurrency investment fraud scams between October 2023 and April 2025. The report provided links to two lists. more
SentinelLABS recently dug deep into AkiraBot, a framework made to spam website chats and contact forms to promote a low-quality search engine optimization (SEO) service. So far, the bot has targeted 400K+ websites and spammed 80K+ websites since September 2024. more
The U.S. Department of Justice seized 114 domains connected to a major information-stealing campaign utilizing Lumma Stealer on 21 May 2025. The Cybersecurity and Infrastructure Security Agency (CISA) released the list of indicators of compromise (IoCs) on the same date. more
Yahoo! News Japan reported cases where securities accounts were hijacked so cybercriminals could sell stocks without their rightful owners' permission. More than 3,500 fraudulent transactions have already been recorded from January to April 2025 alone, amounting to stock owner losses of ¥300+ billion. more
The Federal Bureau of Investigation (FBI) shared a warning on 29 April 2025 about the LabHost phishing-as-a-service (PhaaS) campaign that threatened the security of users worldwide, along with a massive list of related indicators of compromise (IoCs). WhoisXML API embarked on an in-depth analysis of the IoCs through a DNS deep dive. more
Adoption of new short and new long TLDs shows strong momentum, while IDN email compatibility continues to evolve across platforms. more
The market for IPv4 addresses continues to experience deflationary pressures, with recent data showing a steady decline in prices across all block sizes. According to May 2025 figures from IPv4.Global by Hilco Streambank, average prices per address have been trending downward for nearly a year, with large blocks - particularly /16s - leading the descent. more
The MITRE Corporation updates its list of groups on the ATT&CK page every six months, specifically in April and October each year. The Updates - April 2025 advisory listed seven new groups with corresponding lists of indicators of compromise (IoCs) listed in the References section. Take a look at specific IoC-related details for each group below. more
The SideWinder advanced persistent threat (APT) group, active since 2012 and known for targeting government, military, and business entities throughout Asia, primarily Pakistan, China, Nepal, and Afghanistan, has struck once again. This time around, the threat actors updated their toolset and created new infrastructure to spread malware and control compromised systems. more
Based on our Q1 2025 ranking of the most popular gTLDs and ccTLDs, the same players pretty much made the list. The .com gTLD remained in first place while the other gTLD extensions like .xyz, .top, and .shop lagged far behind. Among the ccTLDs, only .de made it to the top 10. more
What is a Dedicated IP VPN? A Dedicated IP VPN is a Virtual Private Network (VPN) service that provides users with a unique, static IP address assigned exclusively to them. Unlike a shared IP address, which is used by multiple users simultaneously, a dedicated IP is reserved for a single user, offering greater control and security over their online activities. more
Starlink provides high-speed, low-latency satellite internet, making it ideal for rural and remote areas lacking traditional broadband. Installation is user-friendly, and coverage continues to expand globally. However, the service is relatively expensive, and performance can be impacted by adverse weather. Overall, Starlink is a reliable choice for those without access to conventional internet options. more
ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more
Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more
Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more
NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more
NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more
The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more
VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more
A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more