The ability to rank results according to the level of threat they pose (based on factors such as, for example, the extent to which a webpage relates to a brand of interest) is a key component of many brand protection services. The prioritisation process has a number of purposes, including the identification of: (a) priority targets for further analysis; (b) candidates for content tracking (i.e. regular reinspection of content or configuration, and the generation of an alert if high-concern findings are identified) - as may be appropriate in cases where a domain name presents a high potential level of risk but is not currently associated with any live site content; and (c) priority targets for enforcement actions. more
The introduction of GDPR in 2018, and the subsequent tightening of privacy regulations around the world, was a necessary step toward protecting user data. Consumers gained critical rights over their personal information, and companies were forced to adopt stronger standards for how they collect, store, and use that data. However, one unintended consequence has been the erosion of access to domain registration information once easily available through WHOIS databases. more
Negotiation processes in the UN are remembered not just for what came out of them, but also for what they were like, who participated, and how they were conducted. People who participated in the first World Summit on the Information Society (WSIS) back in 2003 and 2005 often talk about the process, its challenges and its achievements. more
Cyber criminals are the kings of recycling. Once they've found a tactic that works well, they'll keep doing it as long as they can get away with it. That's why it's so important for research teams to keep a close eye on what's happening behind the scenes with web traffic. Case in point? Our team at DNSFilter recently analyzed global DNS activity from the first quarter of 2025 and identified several notable trends. more
This past week offered a striking illustration of the pace and scale at which our shared orbital environment is evolving. In less than 24 hours, six rockets were launched from different parts of the globe, each contributing to the rapid expansion of low Earth orbit (LEO) infrastructure. China deployed a new set of Guowang satellites, while SpaceX launched two batches of Starlink satellites - one from Vandenberg in California and another from Cape Canaveral in Florida. United Launch Alliance (ULA) successfully placed Amazon's Kuiper satellites into orbit... more
Netscout recently released its latest Threat Intelligence Report that documents DDoS attacks in the second half of 2024. As has been the trend for many years, the largest target of DDoS attacks has been ISP networks. There were over 8.9 million DDoS attacks documented in the second half of last year, up 12.75% over the first half of the year. more
After several delays due to bad weather, Amazon's Project Kuiper finally launched its first batch of low-orbit broadband satellites on April 28. The company says it is in communication with all 27 new satellites. Amazon used a United Launch Alliance (ULA) Atlas V rocket launched from Cape Canaveral. Amazon is under pressure to get the launches going and has a commitment to the FCC to launch 1,618 satellites by July 2026. more
The story of computing and communications over the past eighty years has been a story of quite astounding improvements in the capability, cost and efficiency of computers and communications. If the same efficiency improvements had been made in the automobile industry cars would cost a couple of dollars, would cost fractions of a cent to use for trips, and be capable of travelling at speeds probably approaching the speed of light! more
The debate surrounding digital sovereignty has gained momentum in recent years, particularly within BRICS nations, where governments seek to assert greater control over their digital ecosystems. Proponents of digital sovereignty often frame it as a necessary countermeasure against foreign technological dominance, positioning it as either a "positive" force- fostering local innovation and self-reliance- or a "negative" one- fueling authoritarian control and economic isolation. more
The World Summit on Information Society (WSIS) convened by World leaders in 2003 and 2005 following the realization of the crucial roles of Information and Communications Technologies (ICTs) (also known in the industry as the Internet) played in economic growth and development. Since 2005, ICTs have added more than $10tr to the global economy (Oxford Economics, 2020). more
Tech developments saw less drama than trade and environmental shifts during Trump's first 100 days. Continuity, not abrupt change, defined his approach to AI and digital regulation. Only 9 of 139 executive orders (EOs) focused on tech. Trump's tech policy emphasised reviews and incremental shifts. Public consultations on AI, cybersecurity, and cryptocurrencies signal steady evolution over upheaval. more
Dave Taht died on April 1st. I met him only recently, and never in person, but his passing saddens me. His technical work and evangelism have improved the Internet, and I will give some examples of his contributions to the Internet community and users, but I am sad because he was a good person -- idealistic, unselfish, open, and funny. I'll miss him. First, his contributions, then his values. more
When the Internet outgrew its academic and research roots and gained some prominence and momentum in the broader telecommunications environment, its proponents found themselves in opposition to many of the established practices of international telecommunications arrangements and even in opposition to the principles that lie behind these arrangements. more
Last week, GPD, together with 114 organisations and 57 individual experts from civil society, the technical community, industry and academia, presented a set of cross-stakeholder community recommendations aimed at operationalising the modalities for the twenty-year review of the WSIS (WSIS+20). The open letter responds to the adoption on 25 March of a UN General Assembly resolution on WSIS+20 modalities, advocating for a transparent and inclusive review process that meaningfully engages all relevant stakeholders. more
When major events like the Super Bowl are on the horizon, cybercriminals exploit public trust by creating fraudulent domains for fake betting sites, phishing, and malware distribution. CSC's research into top online sportsbooks highlights the hidden risks of dormant domains, which, though inactive, can quickly be repurposed for cyber attacks. Overlooked yet dangerous, these domains play a key role in impersonation, misinformation, and scams targeting event-driven traffic, underscoring the need for continuous monitoring of lookalike, dropped, re-registered, and newly registered domains. more
In January 2025, President Donald Trump -- now serving his second non-consecutive term -- unveiled a sweeping tariff regime designed to recalibrate America's global trade relationships. Among the measures was a blanket 10% tariff on all imported goods, accompanied by higher, so-called "reciprocal" tariffs targeting specific regions: 20% on EU imports and a dramatic 145% on goods from China. While these heightened rates were temporarily paused on April 9, 2025, for 90 days (excluding China), the 10% baseline tariff remains broadly in effect, symbolizing a shift toward an overtly protectionist economic doctrine. more
You may have read our previous blog about the pending reduction of digital certificate life cycles to just 90 days. This past weekend, the issue gained momentum at the Certification Authority Browser Forum when more detail was discussed following the proposed ballot to set a timeline for shorter lifetime certificates by Apple. This creates real urgency for organizations of all sizes to seriously consider and implement automation into their certificate life cycle management. more
Last month marked 40 years since the registration of the world's first ever .com domain name – symbolics.com – in March 1985. It’s a time to reflect both on the role .com has played in the evolution and growth of the internet over the past 40 years, and on the importance of ensuring that .com remains secure, stable, and resilient for the billions of people who rely on it every day. Who could have imagined in 1985 that over the course of the next four decades, internet users would register hundreds of millions of domain names... more
CTIA, the trade association for cellular companies, published a recent blog titled, "The Looming Spectrum Crisis". The blog quotes a study from Accenture that concludes that a lack of spectrum for 5G is reaching a point of crisis. The Accenture study says that cellular networks will be unable to meet nearly one-fourth of peak-period requests for connection as soon as 2027. more
One major element of many brand-protection programmes is the use of an algorithm to sort the findings identified through monitoring, according to their relevance or level of potential threat. This prioritisation process offers a number of benefits, including the identification of priority targets for further analysis, content tracking, or enforcement. more
Sponsored byVerisign
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byCSC
Choosing an attack surface management or a vulnerability management platform often comes down to identifying which tool provides the right mix of visibility, automation, and precision that matches your team's needs, ideally at as low a price as possible. more
Symantec recently reported that a China-based threat actor who has been involved in installing backdoors in the systems of target government institutions (i.e., cyber espionage) has turned toward spreading RA World ransomware (i.e., a cybercriminal act) this time. Going from one act to the other is not usual for attackers. more
The market for IPv4 addresses is showing signs of a gentle deflation. According to April 2025 sales data from IPv4.Global by Hilco Streambank, the average price per address has declined across all block sizes. more
Each year, threat actors zoom in on U.S. taxpayers in a bid to intercept their payments and line their pockets instead. And while the tax day - 15 April 2025 - has passed, those who need more time can settle their dues up to 15 October 2025 without getting penalized if they requested an extension. more
Outpost24 recently discovered that rising cybercriminal entity EncryptHub inadvertently exposed elements of its malicious enterprise. The security investigation unveiled previously unknown aspects of the group's infrastructure, tools, and behavioral patterns. more
The first quarter of 2025 closed with 368.4 million domain name registrations across all top-level domains (TLDs), an increase of 4.2 million domain name registrations compared to the previous quarter, according to the latest issue of the Domain Name Industry Brief Quarterly Report released Thursday at DNIB.com. more
The targeted attack campaign REF7707 trailed its sights on the foreign ministry of a South American country in February 2025. According to Elastic Labs, the group behind the campaign has been connected to previous compromises in Southeast Asia. more
SecureList recently published a study of Android and iOS apps that have been laced with a malicious software development kit (SDK) dubbed "SparkCat" that steals crypto wallet recovery phrases. more
The Chinese market is the second largest in the world with an estimated GDP of $18 trillion. Over the past few decades, it has grown to be a powerhouse of manufacturing and technology. This has been coupled with a large increase in the internet penetration that now stands at 76%, which for a country of 1.4 billion people is a significant number of people online. more
A recent influx of /16 IPv4 address blocks has sent ripples through the secondary market, triggering a notable decline in average sale prices for the largest address sizes. According to data from IPv4.Global's March 2025 report, average prices for /16 blocks have fallen from nearly $50 per address in mid -- 2024 to just over $24 by March 2025. more
What is a Dedicated IP VPN? A Dedicated IP VPN is a Virtual Private Network (VPN) service that provides users with a unique, static IP address assigned exclusively to them. Unlike a shared IP address, which is used by multiple users simultaneously, a dedicated IP is reserved for a single user, offering greater control and security over their online activities. more
Starlink provides high-speed, low-latency satellite internet, making it ideal for rural and remote areas lacking traditional broadband. Installation is user-friendly, and coverage continues to expand globally. However, the service is relatively expensive, and performance can be impacted by adverse weather. Overall, Starlink is a reliable choice for those without access to conventional internet options. more
ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more
Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more
Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more
NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more
NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more
The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more
VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more
A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more