Cybersecurity |
Sponsored by |
|
Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today.
Africa's cybersecurity failures stem less from sophisticated hackers than from insecure system design, weak governance and limited skills, leaving institutions exposed and shifting the challenge from external threats to internal accountability and resilience.
Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival.
Africa's looming AI rules expose a deeper problem: foreign-controlled infrastructure, weak enforcement capacity and externally governed data flows are eroding digital sovereignty, leaving states unable to regulate, protect citizens or meet global obligations.
A flawed abuse-response system shifts costs from perpetrators to intermediaries, overwhelming enforcement. The Trusted Notifier Network seeks to realign incentives, curb low-quality reporting, and restore efficiency by embedding trust, accountability, and cost redistribution.
Africa's rapid digital expansion, from fintech to e-government, is outpacing its cybersecurity capacity, leaving critical systems exposed and trust at risk unless governments embed security as a core pillar of development across the continent today.
GlobalBlock's expansion into China and Germany signals a shift from reactive brand protection to centralized prevention, as firms seek scalable, cost efficient defences against proliferating AI driven domain abuse worldwide amid a fragmented digital landscape.
ICANN's new DNS abuse rules mark progress, yet short-term domain leasing enables fleeting, hard-to-detect attacks. A proposed 30-day minimum lease could curb cybercrime by undermining the economics of weaponised parked domains.
The UN's new permanent cybersecurity mechanism promises continuity after decades of fleeting forums, yet risks irrelevance unless states enforce existing law, bridge cybercrime divides, address AI threats, build practical capacity, and include non-state expertise meaningfully.
Threat intelligence is shifting from a passive feed to a core operational layer, helping infrastructure defenders connect fragmented signals, identify recurring attack patterns, and prioritise responses in an increasingly modular and fast-moving cybercrime ecosystem.
A once-trusted internet protocol is showing its age. DNSXplore, a global DNSSEC archive, exposes weaknesses, improves diagnostics and nudges adoption, helping secure the cryptographic chain underpinning online trust.
As IP addresses move across borders, outdated geolocation guesses cause service failures and regulatory risks. Geofeed and Signed Geofeed replace inference with verified declarations, promising accurate, resilient and sovereign foundations for global internet infrastructure governance.
The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning.
Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today.
Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence.
U.S. Blocks Foreign-Made Routers Over Cybersecurity Fears
Iran Targeted by Self-Propagating Malware in Supply-Chain Cyberattacks
Iran Expands Digital Dragnet After Crushing Protests
Microsoft Warns Extortion Drives Majority of Attacks Amid AI Escalation, Identity Collapse, and Global Fragmentation
Hyper-Volumetric DDoS Attack Sets New Benchmark at 22.2 Tbps
European Airports Still Reeling from Ransomware Attack as Software Fix Nears
Chinese APT Groups Exploit Global Domains in Sweeping Cyber Campaign
Advanced AI Is Reshaping the Cybercriminal Landscape at Alarming Speed
FTC to Big Tech: Don’t Trade American Privacy for Foreign Demands
INTERPOL Leads Arrest of 1,209 Suspects in Pan-African Cybercrime Crackdown, Recovers $97 MillionAddressing DNS abuse and maintaining a healthy DNS ecosystem are important components of Verisign's commitment to being a responsible steward of the internet. We continuously engage with the Internet Corporation for Assigned Names and Numbers (ICANN) and other industry partners to help ensure the secure, stable and resilient operation of the DNS. more
Verisign just released its Q2 2018 DDoS Trends Report, which represents a unique view into the attack trends unfolding online, through observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of customers of Verisign DDoS Protection Services. more
Currently scheduled for October 11, 2018, the Internet Corporation for Assigned Names and Numbers (ICANN) plans to change the cryptographic key that helps to secure the internet's Domain Name System (DNS) by performing a Root Zone Domain Name System Security Extensions (DNSSEC) key signing key (KSK) rollover. more
Verisign has released its Q1 2018 DDoS Trends Report, which represents a unique view into the attack trends unfolding online, through observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of Verisign DDoS Protection Services, and security research conducted by Verisign Security Services. more
As DNS attacks grow in frequency and impact, organizations can no longer afford to overlook DNS security as part of their overall defense-in-depth strategy. As with IT security in general, no single tactic can address the entire DNS threat landscape or secure the complete DNS ecosystem. more
Verisign has released its Q4 2017 DDoS Trends Report, which represents a unique view into the attack trends unfolding online, through observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of Verisign DDoS Protection Services and security research conducted by Verisign Security Services. more
Cybercriminals recognize the value of DNS availability and look for ways to compromise DNS uptime and the DNS servers that support it. As such, DNS becomes an important point of security enforcement and a potential point in the Cyber Kill Chain for many cyber-attacks. more