Hot Topics:   Cybersecurity    Domain Names    Artificial Intelligence    Cyberattack    DNS Security    Threat Intelligence    Broadband   
NordVPN Promotion

Featured Blogs

Using AI to Develop the Informal Sector in Africa

Katim Seringe Touray Artificial intelligence is transforming Africa's informal economy by improving access to finance, optimizing business operations, and helping small-scale entrepreneurs transition into the formal sector, despite challenges such as digital illiteracy and infrastructure gaps.

The Hidden Risks of AI Notetakers: Precaution or Paranoia?

Doug Dawson As AI notetakers become common in virtual meetings, concerns grow over data privacy, potential misuse, and the risks of unknowingly sharing sensitive corporate information with unseen third parties beyond organizational control.

Why WiFi is the Real Pain Point for ISPs and Customers

Doug Dawson Most households experience poor WiFi performance, yet ISPs routinely overlook in-home coverage gaps. A new survey reveals that customers increasingly conflate WiFi with broadband itself, and many are willing to switch providers for better service.

Western LEO Satellite Internet Update: OneWeb, Telesat, Amazon Project Kuiper and IRIS²

Larry Press While Starlink dominates the low-Earth orbit internet race, rivals like OneWeb, Telesat, Amazon's Project Kuiper, and Europe's IRIS² are slowly building capacity, buoyed by geopolitical necessity, state support, and commercial partnerships.

eco and AV-Test Publish Monthly topDNS Reports for Internet Service Providers

Thomas Rickert eco's topDNS initiative and AV-Test are publishing monthly reports to help ISPs detect and mitigate DNS abuse by analysing malware, phishing, and PUA trends, creating a long-term data foundation for industry-wide transparency.

Overcoming DNSSEC Challenges: A Guide for TLDs

Enrique Somoza Despite offering robust protection for the Domain Name System, DNSSEC suffers from poor adoption due to its complexity, cost, and operational risks. Automation and algorithmic improvements now offer practical solutions for broader deployment.

RIR Gainers and Leakers: How Policy Choices Shape the Future of the IPv4 Ecosystem

Vincentas Grinius Diverging policies and fee structures among Regional Internet Registries are reshaping the global IPv4 market. RIPE has emerged as a liquidity hub, while others leak resources, risking long-term instability and financial fragility.

The Public Interest and the Root: Why the Next Round Demands a Public Law Approach to DNS Governance

Joanna Kulesza As ICANN prepares to expand the domain name space, calls grow for a public-law framework to govern the DNS root, ensuring global equity, transparency, and accountability in managing the Internet's core infrastructure.

How the Growth of AI May Drive a Fundamental Step-Change in the Domain Name Landscape

David Barnett As artificial intelligence reshapes how users navigate the web, domain names may undergo explosive growth, potentially reaching tens of billions. A new infrastructure of trusted digital identities could become essential for AI agents.

Building a Trusted Internet Starts with Hosting Providers

David Snead The Secure Hosting Alliance has introduced a certification programme to establish clear, verifiable standards for internet hosting providers, aiming to improve accountability, boost transparency, and strengthen the trust that underpins global online infrastructure.

FCC to Review State AI Regulation

Doug Dawson The FCC is considering whether it can preempt state-level AI regulations using telecommunications law. Legal precedent and jurisdictional ambiguity, however, make such a maneuver uncertain and likely to face significant industry and judicial resistance.

Israel’s Brutal Gaza ICT Infrastructure Demolition Derby

Katim Seringe Touray Over two years of war, Israel has decimated Gaza's ICT infrastructure, crippling connectivity, impeding emergency response, and isolating civilians from the digital world, while cementing long-standing control over telecommunications under the guise of national security.

Centralizing DNS Data for Security, Compliance, and Performance

Enrique Somoza Private DNS data lakes consolidate fragmented logs into a centralised platform, improving visibility, security, and compliance. They enable advanced analytics, strengthen threat detection, and help organisations optimise network performance in increasingly complex IT environments.

Leased, Not Owned: Why the Future of the Internet Is Likely Subscription-Based

Vincentas Grinius From software to network architecture, the internet is shifting from ownership to on-demand access. Subscription models now underpin the digital economy, offering scalability and agility while raising fresh questions about control, cost and compliance.

Big Tech AI Companies Should Invest in Energy and AI Infrastructure in Africa

Katim Seringe Touray Big Tech firms should back Africa's AI future by investing in its vast energy resources and infrastructure needs. Doing so offers a strategic answer to growing data demands and an opportunity for shared prosperity.

Lost in Space: The Limits of Geolocation in a Satellite-Connected World

Geoff Huston Starlink's global reach is distorting conventional IP geolocation, blurring national boundaries and skewing internet usage data. As satellites replace cables, measuring users' precise locations has become an increasingly uncertain and politically charged task.

A School Without WiFi: Learning in America’s Quiet Zone

Doug Dawson There was an interesting article in the Washington Post that talked about an elementary/middle school in West Virginia that is finally going to get WiFi for students. The Green-Bank Elementary-Middle School is located within the National Radio Quiet Zone.

SES Pursues Multi-Orbit Satellite Internet via Strategic Partnerships

Larry Press SES's first multi-orbit partnership was Cruise mPOWERED + Starlink, providing a managed blend of SES MEO and Starlink LEO service for maritime operators, and we can expect similar bundled services in aviation and enterprise markets.

Broadband Technology Improving - Faster, Smarter, and More Versatile Connectivity

Doug Dawson Broadband infrastructure is advancing rapidly, from multi-gigabit cable and fiber networks to next-generation fixed wireless and satellite systems. With speeds reaching up to 25 Gbps for consumers and 1 Tbps in orbit, these developments mark a pivotal shift in connectivity, setting the stage for more scalable, flexible, and high-capacity networks.

AFRINIC Finally Elects a New Board: What Next?

Mwendwa Kivuva AFRINIC-The Regional Internet Registry for Africa has finally successfully conducted its 2025 Board of Directors Elections! The elections were held from September 10 to 12, 2025. This fresh leadership marks the beginning of a new era after years of turbulence and uncertainty for the organization.

News Briefs

Starlink Passes 10,000 Satellites, Expanding Global Internet Reach

SpaceX has launched over 10,000 Starlink satellites, solidifying its lead in low-Earth orbit internet infrastructure and accelerating a broader industry shift toward satellite-based broadband in underserved and remote regions worldwide. more

Massive AWS Outage Disrupts Global Internet, Services Restored After DNS Failure

A major Amazon Web Services outage briefly disrupted millions of websites, apps, and smart devices worldwide. The DNS-related failure exposed the internet's heavy dependence on a few cloud providers before full recovery was achieved. more

Microsoft Warns Extortion Drives Majority of Attacks Amid AI Escalation, Identity Collapse, and Global Fragmentation

Microsoft's latest Digital Defense Report reveals how cybercriminals and nation-states are rapidly adopting AI to enhance attacks. With identity-based threats soaring, the company urges urgent modernization of security systems and global cooperation. more

New Paper Proposes ‘Attested DNS’ to Secure Domain Names with Trusted Hardware

Azure researchers propose attested DNS, a system that embeds confidential computing into the internet's naming infrastructure. By binding domain names to trusted hardware and software, it enhances service verification while maintaining compatibility with existing web technologies. more

Cloudflare Challenges Google’s AI Dominance With New Web Content Policy

Cloudflare's new policy challenges Google's AI practices, giving website owners legal tools to control how their content is scraped, used, and monetised by AI systems. more

U.S. Senators Push for Federal Oversight of Advanced AI Systems

Senators Hawley and Blumenthal propose a bipartisan bill requiring federal evaluation of advanced AI systems, aiming to prevent misuse while balancing national security, civil liberties, and technological competitiveness. more

Hyper-Volumetric DDoS Attack Sets New Benchmark at 22.2 Tbps

A record-shattering DDoS attack peaking at 22.2 Tbps signals a new era of cyber aggression, driven by weaponized IoT botnets and raising urgent questions about global internet resilience. more

Stargate Expands: OpenAI and Partners Unveil Massive AI Infrastructure Push Across the U.S.

OpenAI, Oracle, and SoftBank have announced five new data centers as part of their $500 billion Stargate initiative. This privately funded project aims to expand AI infrastructure across the United States. more

Com Laude Acquires Markmonitor in $450M Deal

London-based Com Laude, owned by PX3 Partners, will acquire Markmonitor from Newfold Digital for $450 million, merging two long-established firms in the corporate domain management sector. more

European Airports Still Reeling from Ransomware Attack as Software Fix Nears

European air travel remains disrupted today following a ransomware attack on Friday that crippled automated check-in and boarding systems across several major airports. The culprit appears to be malicious code targeting Muse, a system developed by Collins Aerospace, a subsidiary of RTX, which provides critical software to airlines. more

14th Registration Operations Workshop Set for September 30, 2025

The Registration Operations Workshop (ROW), an informal gathering of DNS professionals, is set to continue its tradition of fostering technical dialogue and knowledge-sharing across the domain name ecosystem. more

Study Finds IPv6 Adoption Exposes More Residential Devices to Unsolicited Traffic

As IPv6 adoption accelerates, a new study warns that the disappearance of NAT in home networks is exposing millions of devices to online threats -- potentially fueling a new wave of powerful IoT botnets. more

Chinese APT Groups Exploit Global Domains in Sweeping Cyber Campaign

A years-long cyberespionage campaign by a Chinese state-sponsored group known as Salt Typhoon has revealed a striking escalation in both scale and technical sophistication. more

Digital Rights Defender Steps Aside: Cindy Cohn to Leave EFF After 25 Years

Cindy Cohn, a leading advocate for digital civil liberties, will step down as executive director of the Electronic Frontier Foundation (EFF) by mid-2026. Her departure marks the end of a tenure spanning over two decades, including ten years at the helm of the San Francisco-based nonprofit. more

AFRINIC at the Crossroads: ISPA Endorses Candidates Ahead of Pivotal Board Election

After three years of turmoil, AFRINIC - the regional internet registry for Africa - has opened online voting for a new board, marking what could be a turning point for the embattled organisation. The election, running from September 10 to 12, follows a failed attempt earlier this year that was annulled amid allegations of vote manipulation and procedural irregularities. more

JetBlue Selects Amazon’s Project Kuiper for In-Flight Satellite Connectivity

Amazon's satellite-internet project, Project Kuiper, has signed its first commercial airline partner: JetBlue. The budget-friendly airline will start adding Kuiper's satellite terminals to its planes to offer free in-flight Wi-Fi, a feature that now helps airlines stand out in a crowded market. more

Chat Control Proposal Advances Despite Rising Opposition in Europe

Support for the European Union's contentious Chat Control legislation - designed to combat child sexual abuse material (CSAM) - remains strong, yet a rising chorus of opposition now threatens to complicate its path to adoption. more

Advanced AI Is Reshaping the Cybercriminal Landscape at Alarming Speed

A new report has shed light on how advanced artificial intelligence is reshaping the cybercriminal landscape. The latest threat intelligence assessment by Anthropic details how its AI model, Claude, was misused in a string of global cyberattacks that mark a sharp escalation in both scale and sophistication. more

FTC to Big Tech: Don’t Trade American Privacy for Foreign Demands

In a striking admonition issued on August 21st, Andrew Ferguson, chairman of the Federal Trade Commission (FTC), cautioned over a dozen major technology firms against bowing to foreign demands that compromise American users' data security or freedom of speech. more

The Edgemoor Research Institute and TWNIC Launch Project Jake to Advance DNS Security and Data Transparency

The Edgemoor Research Institute (ERI) and Taiwan's .TW Registry (TWNIC) have announced a three-year strategic partnership to enhance Domain Name System (DNS) data management and internet security. The collaboration focuses on joint research, data sharing, and capacity building, aiming to strengthen global internet infrastructure and governance. more

China Temporarily Cuts Itself Off from the Global Internet

China briefly disconnected from much of the global internet for over an hour on Wednesday, following a disruption traced to the country's "Great Firewall." According to activist group Great Firewall Report, the outage began at 12:34 a.m. Beijing time and lasted until 1:48 a.m. on August 20. more

INTERPOL Leads Arrest of 1,209 Suspects in Pan-African Cybercrime Crackdown, Recovers $97 Million

Authorities across 18 African nations, aided by the United Kingdom and INTERPOL, have arrested 1,209 suspects and dismantled over 11,000 illicit cyber infrastructures. more

The CEO Is Not Who They Seem: Deepfakes Target Corporate Trust

A surge in AI-generated deepfake scams is reshaping the cybersecurity threat landscape, with fraudsters now impersonating company executives to deceive employees and siphon off millions. more

New gTLD Program’s Credibility Questioned Amid Weak Global Uptake

The credibility of ICANN's much-vaunted programme to expand internet domains is under strain. Governments and user representatives have warned that the Applicant Support Program (ASP) - a scheme offering fee discounts to poorer or non-profit applicants for new top-level domains (gTLDs) - is failing to reach its intended beneficiaries. more

Converging Technologies Create New Cyber Threats, UK Government Warns

As digital technologies intertwine ever more closely, new vulnerabilities are surfacing in unexpected places. A recent UK government report highlights how the convergence of emerging technologies - such as artificial intelligence (AI), blockchain, quantum computing, and the Internet of Things (IoT) - is generating complex cybersecurity risks across critical sectors. more

Most Read – Last 30 Days

Recent Comments

A Constitutional Moment for the IGF

Topics

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

NordVPN Promotion

Industry Updates

IPv4 Market Update: Prices Decline, but Market Fundamentals Remain Resilient

IPv4.Global IPv4 address prices continued to decline through Q3 2025, yet steady demand and strong supply are keeping the market active. Smaller blocks remain more resilient as larger allocations face sharper pricing pressure. more

Scouring the DNS for Traces of the Hiddengh0st and Winos SEO Poisoning Campaign

WhoisXML API A Chinese-language SEO poisoning campaign has been uncovered, leading users to fake software sites. Investigators linked the scheme to malware variants and uncovered thousands of malicious domains, subdomains, and IP addresses through DNS and WHOIS analysis. more

Understanding DNSSEC: Best Practices and Implementation Challenges

DigiCert DNS Security Extensions (DNSSEC) offer cryptographic safeguards to validate DNS responses, countering spoofing and cache poisoning. While implementation is complex, best practices and third-party services help firms navigate the operational demands of deployment. more

False Positive Rate Reduced to 1.66% on WhoisXML API’s First Watch Malicious Domains Data Feed

WhoisXML API WhoisXML API has halved the false positive rate of its malicious domain feed, enhancing detection precision. The update refines machine learning models, promising leaner cybersecurity operations and fewer interruptions from erroneous threat alerts. more

Thumbing through the DNS Trail of the TAOTH Campaign

WhoisXML API A cyber campaign targeting East Asian elites leveraged fake web services. DNS forensics uncovered suspicious domains, IP links, and signs of future infrastructure repurposing. more

Deep Dive: 3 Lazarus RATs Caught in Our DNS Trap

WhoisXML API Researchers tracked three Lazarus-linked RATs to a vast DNS network, uncovering dormant domains, geolocated IPs, and artifacts tied to financial and cryptocurrency sector intrusions. more

How Brands Can Prepare for the New GTLD Program

DigiCert For the first time in over a decade, the internet is opening its gates to a new wave of generic top-level domains (gTLDs). This is not just an opportunity to register a domain name, but the entire top-level domain itself. more

Cross-Examining the CAPTCHAgeddon Brought on by ClickFix

WhoisXML API Guardio reported about the ClickFix stealer that is considered an evolved version of fake browser updates. Instead of relying on a file download, it used fake CAPTCHA pages that allowed it to evade detection more effectively. more

IPv4.Global Relaunches ProVision Platform Backed by Hilco Global’s Proven Expertise

IPv4.Global IPv4.Global, part of Hilco Global's Capital Solutions division, today announced the relaunch of ProVision, the advanced network automation platform trusted by enterprises and service providers to simplify and scale critical infrastructure management. more

A Deep Dive Into the GreedyBear Attack

WhoisXML API Koi Security recently dove into the widely executed and highly coordinated GreedyBear crypto theft attack that used 150 weaponized Firefox extensions. According to the company, it utilized close to 500 malicious executables and dozens of phishing sites. The result? The threat actors have amassed more than US$1 million to date. more

Industry Guides

Dedicated IP VPN: Complete Guide, Benefits, Setup & More

What is a Dedicated IP VPN? A Dedicated IP VPN is a Virtual Private Network (VPN) service that provides users with a unique, static IP address assigned exclusively to them. Unlike a shared IP address, which is used by multiple users simultaneously, a dedicated IP is reserved for a single user, offering greater control and security over their online activities. more

Starlink Internet Service (2024 Review)

Starlink provides high-speed, low-latency satellite internet, making it ideal for rural and remote areas lacking traditional broadband. Installation is user-friendly, and coverage continues to expand globally. However, the service is relatively expensive, and performance can be impacted by adverse weather. Overall, Starlink is a reliable choice for those without access to conventional internet options. more

Can ISPs See My VPN? (All You Need to Know)

ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more

What is Satellite Internet? (Complete Guide, Costs, Providers, and More)

Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more

Does NordVPN Still Work With Netflix? How to Use It and Fix It If Not Working

Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more

How to Get NordVPN Free Trial (Risk-Free Options for 2024)

NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more

NordVPN Review 2024: Is It Fast, Secure, and Worth It?

NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more

Best VPN Countries for Privacy, Speed, and Streaming (2024)

The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more

Why Are VPNs Important for Remote Work?

VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more

How Does a VPN Protect You?

A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more