Hot Topics:   Domain Names    Cybersecurity    Threat Intelligence    Cyberattack    DNS Security    Internet Governance    Whois   

Featured Blogs

Rethinking Europe’s Cloud Future: Balancing Regulation and Innovation

Vincentas Grinius European efforts to build independent cloud infrastructure face challenges from regulatory overreach and dependence on U.S. cloud providers. Some say that a balanced approach focused on collaboration and flexible standards will be needed to strengthen data sovereignty and foster regional growth. Eighty percent of corporate executives in Germany say that Europe's future prosperity will depend on secure and independent digital infrastructure. more

Why Businesses Aren’t Hanging Up Landlines Yet

Doug Dawson There was a recent article in the Wall Street Journal that noted that the business world still uses a lot of landline telephones. Landline telephones have been steadily disappearing from homes, but are still not gone. I see ISPs still selling a telephone line to 10% or more of passings, and surveys show that the average residential landline penetration rate is still somewhere between 15% and 20%. more

Learning from History: The Potsdam Call on Autonomous Weapon Systems

Wolfgang Kleinwächter Eighty years ago, in August 1945, the world saw hope and horror. On August 1, 1945, just weeks after the adoption of the UN Charter, the leaders of the United States, the United Kingdom and the Soviet Union signed the Potsdam Agreement, which produced hope for a peaceful post-war world. Only some days later, the world saw the horror of nuclear bombs in Hiroshima and Nagasaki. A cold war followed. more

AI in Academia: Tool or Trap? Balancing Innovation and Intellectual Honesty in the Digital Age

Javier Rodriguez AI has revolutionized how we process information, optimize tasks, and conduct research. However, its integration into academia sparks ethical and practical debates. Should we limit its use? How can we assess a student's true knowledge if they employ these tools? This text explores these questions from the perspective of a technology expert who argues that banning AI is as absurd as rejecting calculators or spreadsheets in the past. more

The Latest DNS Threat Landscape: Why CISOs Must Rethink Blocking Strategies

TK Keanini Cybercriminals live by the tenet "If it ain't broke, don't fix it." They'll use the same tactics repeatedly until they no longer work, then switch things up. That's why CISOs and their security teams maintain constant vigilance. Underscoring this, recent analysis of global DNS activity found that new domains continue to be a major tactic for bad actors. more

Just Say What You Mean: Avoiding Deadlock on Enhanced Cooperation in the WSIS+20 Review

William J. Drake On 29 July 2025, the UN organized a WSIS+20 Informal Stakeholder Consultation at which a number of government and stakeholder representations made three-minute statements. This was in response to the Elements Paper circulated by the WSIS+20 Review's Co-facilitators, an important initial step en route to the zero draft of the text that will be the basis of negotiations and consultations over the next months in advance of the formal WSIS Review in the UN General Assembly in December. more

The IPv6 Divide: How Slow Adoption Creates Digital Vulnerabilities and Economic Inequality

Vincentas Grinius The shift to IPv6 has escalated into a matter of national security, as nations lagging in adoption are increasingly exposed to cyber threats and diminished control over their digital infrastructure due to the limited availability of IPv4. With IPv6-only environments becoming more common, reliance on IPv4 may lead to slower connectivity, deepening the digital divide and potentially worsening economic disparities. In this geopolitical landscape, moving to IPv6 serves as a critical step toward maintaining digital independence. more

WSIS+20 and the Youth Dilemma: Rethinking Participation in Global Internet Governance

Nadia Tjahja On Wednesday, 9 July, I attended the WSIS+20 HLE Overall Review multistakeholder consultation with co-facilitators H.E. Mr Ekitela Locale from the Republic of Kenya, and H.E. Ms Suela Janina from the Republic of Albania with my UNU-CRIS hat and had the opportunity to talk with them together with my fellow youth IGF colleagues Dana Cramer and Jasmine Ko. We discussed youth participation in Internet governance, and I raised my concerns about the future of youth IGFs. more

ICANN at a Crossroads: Rebuilding Internet Governance in an Age of Disruption

Gregory Francis 2025 is not a banner year for the status quo. A fashion for deregulation, ignoring processes and questioning whatever was long-established is finding enough adherents that even things which work well are being upended. That's why those looking for leverage to use in hurried dealmaking, or countries with plans to rebalance where digital power lies, may find a handy tool in ICANN. more

Mauritius Steps In: Unraveling the AFRINIC Crisis and Its Impact on African Internet Governance

Mwendwa Kivuva A Supreme Court judge in Mauritius has been appointed to investigate AFRINIC, Africa's IP address registry, following allegations of misconduct, legal irregularities, and criminal falsification. The inquiry marks a pivotal moment in African internet governance, with implications for regional digital infrastructure and the continent's credibility in managing critical online resources. more

A Constitutional Moment for the IGF

Bertrand de La Chapelle The future of the Internet Governance Forum (IGF) is an important part of the WSIS+20 review process. But after 20 years, the key question should now be its organizational evolution, more than just how long its mandate should be extended or whether it should be rebranded. The time has come for a constitutional moment for the IGF. A dedicated review process should take place in 2026 around three core questions. more

The Commonest Domain Features: Constructing Look-Up Tables for Use as Part of a Domain Risk Scoring System

David Barnett Many previous pieces of research have focused on the desirability of a comprehensive scoring system, to be used for ranking results identified as part of a brand-protection solution, according to their potential level of threat. Such scoring systems offer the capability for identifying prioritised targets for further analysis, content tracking or enforcement actions. more

An Open Letter to the ICANN Community: Not the Community Priority Evaluation We Intended

Kathy Kleiman Today, I share a warning about serious changes to the Community Priority Evaluation (CPE) of the New gTLD Applicant Guidebook. They are not driven by public comment, but by a few voices within the SubPro Implementation Review Team - and they are very likely to lead to disastrous misappropriation of well-known community names, including those of Tribes, Indigenous Peoples and NGOs around the world. more

AFRINIC’s Election Crisis Exposes Why RIR Oversight Must Evolve

Pari Esfandiari What might look like a routine procedural dispute over votes is, in fact, a glaring reminder that Regional Internet Registries (RIRs) are now geopolitical pressure points - and that ICANN's oversight of RIR governance must evolve to meet these risks. On 23 June 2025, AFRINIC, the RIR that serves Africa, attempted to hold long-delayed elections to restore stability after years of legal battles and board paralysis. Yet instead of restoring trust, the process imploded almost immediately. more

Cloud-Edge Collaboration: The Inevitable Future of AI Computing

Kenny Huang Over the past decade, cloud computing has experienced explosive growth, evolving from its nascent stage to widespread adoption and fundamentally changing how businesses and individuals use information technology. At the same time, traditional on-premise computing, while still having its use cases, has been progressively integrated with, and often even controlled by, Cloud Service Providers (CSPs) in many aspects. more

Breaking Ground: Historic Launch of UN Global Mechanism for Cyberspace Governance

Joanna Kulesza The international community has long struggled with the challenge of translating international law into actionable norms and practices in cyberspace. The conclusion of the United Nations Open-Ended Working Group (OEWG) on the security of and in the use of information and communications technologies 2021-2025 marks a vital milestone in that ongoing process.  more

An Internet Infrastructure Perspective on AI Service Provision

Charles Mok This study analyzes the differences in domain name and IP address strategies among a number of current mainstream artificial intelligence (AI) service providers. We find that these technical choices not only reflect deployment decisions but also deep-seated corporate knowledge and capabilities in Internet infrastructure service provision, as well as brand positioning and market strategies. more

Implications of Satellite Being Broadband

Doug Dawson We've had a quiet policy change in the United States over the last year, where satellite broadband is starting to be considered broadband by the federal government. Any rural household that subscribes to and loves Starlink would wonder why this is news, but from a policy perspective, it is a big deal. I've been considering what this shift might mean in the future. The FCC decided that Starlink wasn't broadband when it rejected Starlink's long-form filing in August 2022, where Starlink wanted to claim the funding it had won in the RDOF reverse auction.  more

Have LLMs Broken Fair Use?

John Levine Two sets of authors sued Anthropic and Meta in San Francisco for copyright infringement, arguing that the companies had pirated their works to train their LLMs. Everyone agreed that a key question was whether fair use allowed it, and in both cases, the courts looked at the fair use issue before dealing with other aspects of the cases. Even though the facts in both cases were very similar, last week, two judges in the same court wrote opinions, coming to very different conclusions. How can that happen? Is fair use broken? more

IS3C Report: Socio-Political and Technical Impacts of Post Quantum Cryptography Policies

Wout de Natris At the 20th Internet Governance Forum in Lillestrøm, Norway, the UN Internet Governance Forum's dynamic coalition Internet Standards, Security and Safety (IS3C) released its new report on post-quantum policies. This report presents the findings of a collaborative study undertaken by IS3C and the French domain name registry Afnic and examines the critical need for Post-Quantum Cryptography (PQC) to achieve greater security in the ever-expanding global IoT landscape. more

News Briefs

The CEO Is Not Who They Seem: Deepfakes Target Corporate Trust

A surge in AI-generated deepfake scams is reshaping the cybersecurity threat landscape, with fraudsters now impersonating company executives to deceive employees and siphon off millions. more

New gTLD Program’s Credibility Questioned Amid Weak Global Uptake

The credibility of ICANN's much-vaunted programme to expand internet domains is under strain. Governments and user representatives have warned that the Applicant Support Program (ASP) - a scheme offering fee discounts to poorer or non-profit applicants for new top-level domains (gTLDs) - is failing to reach its intended beneficiaries. more

Converging Technologies Create New Cyber Threats, UK Government Warns

As digital technologies intertwine ever more closely, new vulnerabilities are surfacing in unexpected places. A recent UK government report highlights how the convergence of emerging technologies - such as artificial intelligence (AI), blockchain, quantum computing, and the Internet of Things (IoT) - is generating complex cybersecurity risks across critical sectors. more

ICANN Warns of Governance Crisis at AFRINIC Amid Allegations and Legal Challenges

The Internet Corporation for Assigned Names and Numbers (ICANN) has issued a stern open letter to the Government of Mauritius and the court-appointed receiver of AFRINIC, the Regional Internet Registry (RIR) for Africa and the Indian Ocean. The letter, dated July 16th, expresses grave concern over AFRINIC’s governance failures, opaque election practices, and recent attempts by a controversial resource member to dissolve the organization. more

Disconnecting Finance: The EU’s Risky Use of Domain Takedowns as Regulatory Weapon

The European Union is increasingly wielding domain name deletions as a tool of financial enforcement - a trend sparked by the Markets in Crypto-Assets Regulation (MiCA) and now spreading across other legislative efforts such as the Financial Data Access Framework (FiDA) and the Payment Services Regulation (PSR).  more

Global Domain Name Market Reaches 372 Million Domains, 1.5% Growth in 2024

Afnic, the French association in charge of the .fr domain and several other Internet Top Level Domains, has published the 2024 edition of its annual analysis "The Global Domain Name Market". Here is a summary of the overarching trends and key figures. more

Starlink Accelerates IPv6 Adoption in Eight Nations

A wave of new entrants has joined the so-called "majority IPv6 club," with eight countries surpassing 50% adoption of the modern internet protocol, according to recent data from the Internet Society. Among the most dramatic changes was in Tuvalu, where the arrival of Starlink - a satellite internet service offered by Elon Musk's SpaceX -- catapulted IPv6 usage from zero to 59% in just a few months. more

ICANN Warns of Possible Sanctions Over AFRINIC Election Irregularities

Mounting governance woes at the African Network Information Centre (AFRINIC) have drawn a sharp rebuke from the Internet Corporation for Assigned Names and Numbers (ICANN), which has issued a stern warning of a potential compliance review. more

ICANN Demands Fairness in AFRINIC Board Elections Amid Governance Concerns

The Internet Corporation for Assigned Names and Numbers (ICANN) has issued a formal call for greater transparency and procedural integrity in the ongoing board elections of the African Network Information Centre (AFRINIC). more

Smuggled Phone Reveals North Korea’s Regime Captures User Screens Every Five Minutes, Censors Texting

A smartphone smuggled out of North Korea has revealed the alarming extent of digital surveillance enforced by the Kim regime. Though it resembles a modern Android device, the software within tells a darker story: every five minutes, the phone covertly captures screenshots, storing them in an inaccessible folder for later state inspection. more

America’s Broadband Blind Spot: Audit Reveals Millions More Offline Than FCC Reports

A new audit has sharply challenged the Federal Communications Commission's (FCC) broadband availability estimates, revealing that 26 million Americans lack access to fixed 100/20 Mbps internet, 6.4 million more than the FCC claims. more

i2Coalition Launches ‘DNS at Risk’ Report, Warns of Rising DNS Abuse and Censorship

The i2Coalition has unveiled a new report and website, DNS at Risk, spotlighting the growing misuse of Internet infrastructure by governments to control online content. Released on June 3rd, the initiative documents how states are increasingly deploying DNS resolvers and IP filtering—originally neutral systems—as tools of censorship and enforcement. more

Cyberattacks Spur Boom in Insurance Demand Amid Rising Global Threats

A wave of high-profile cyberattacks is reshaping the global insurance industry, creating both risk and reward for major players. According to a new Bloomberg report, firms like Munich Re and Chubb are capitalising on surging demand for cyber insurance as artificial intelligence makes digital breaches more frequent and destructive. more

Japan Post Launches Digital Codes to Replace Traditional Addresses

Japan Post said Monday that it has launched a "digital address" system that links seven-digit combinations of numbers and letters to physical addresses. more

ccTLD Registries Push Back Against EU’s Disinformation Crackdown

As the European Union presses ahead with its European Democracy Shield (EUDS) to counter foreign disinformation, European country code top-level domain (ccTLD) registries are urging caution. more

Massive Iberian Power Outage Raises Cybersecurity Questions

On April 28th, a widespread blackout plunged millions across Spain, Portugal, and parts of south-west France into darkness, disrupting homes, transit systems, and even sporting events like the Madrid Open. more

The .FR TLD in 2024: Consolidation of Benefits of the Digital Transformation

Afnic, the .FR Top Level Domain registry published its annual report that details the activity of .FR over the past year. Analyses of the specificities of the French Internet domain and domain market trends in France in 2024. more

Colombian Government Accelerates .CO Domain RFP Process

The Colombian's Ministry of ICT (MinTIC), and ccTLD Manager for the .CO ccTLD, recently announced an expedited timeline for the Request for Proposal (RFP) to operate over 3 million .CO domains for the next 10 years. The proposed 10-year term is double the current five-year term. This represents the latest in a series of recent RFPs associated with several high-profile TLDs before ICANN's planned roll-out of new gTLD early next year. more

Africa’s Digital Darkness: Internet Shutdowns Reach Record High

Governments across Africa increasingly wield internet blackouts as a tool to suppress dissent, with 2024 marking a record high for digital censorship. According to a report by Access Now and #KeepItOn, 21 internet shutdowns were recorded across 15 African nations, surpassing previous highs in 2020 and 2021. more

Massive Cyber Assault on X: Musk Hints at Foreign Involvement

Elon Musk has attributed a series of major disruptions on X, the social media platform he owns, to a large-scale cyberattack. The outages, which persisted for several hours today (and are still ongoing), left users unable to access the service, triggering a flurry of speculation. more

Lack of Broadband Competition Leads to Higher Prices in Most U.S. Counties

A recent study has revealed that broadband competition remains severely limited in 96% of U.S. counties, leading to significantly higher internet costs for consumers. Using the Herfindahl-Hirschman Index (HHI), researchers at BroadbandNow Research analyzed broadband market concentration across 3,143 counties and found a direct link between limited provider options and inflated prices. more

Meta’s Undersea Ambitions: A Cable to Power the AI Future

Meta has unveiled plans for an ambitious undersea cable project that, at 50,000 kilometers (31,000 miles), would be the longest in the world—surpassing the Earth’s circumference. Dubbed Project Waterworth, the infrastructure aims to link the United States with India, Brazil, South Africa, and other regions, bolstering global connectivity and supporting artificial intelligence (AI) development. more

India Launches ‘.bank.in’ and ‘.fin.in’ Domains to Deter Financial Fraud

In a bid to bolster cybersecurity in India's financial sector, the Reserve Bank of India (RBI) has announced exclusive internet domains -- 'bank.in' for registered banks and 'fin.in' for non-banking financial entities. RBI Governor Sanjay Malhotra revealed that registrations for 'bank.in' will commence in April 2025, followed by 'fin.in', with the initiative aimed at reducing phishing attempts and fortifying digital banking trust. more

12-Year-Old’s Lost Video Has Resurfaced, Discussing Bitcoin at $8 and the Power of Peer-to-Peer Transactions

In 2011, a 12-year-old unknowingly predicted Bitcoin's rise in a forgotten YouTube video. Now, crypto enthusiasts have rediscovered it, launching $TPU, a Solana-based memecoin named after his old channel. The internet is hailing him as an accidental visionary, proving once again that the digital world never forgets -- and that early tech predictions can age like fine wine. more

New VPN Protocol Outsmarts VPN Blockers

NordVPN has introduced NordWhisper, a new protocol designed to bypass VPN restrictions in countries such as Russia and India. The protocol mimics regular internet traffic, making it difficult for internet service providers (ISPs) and websites to detect and block VPN usage. more

Most Read – Last 30 Days

Recent Comments

ICANN is Broken
Ossification and the Internet
ICANN is Broken

Topics

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Industry Updates

IPv4 Market Heats Up as Transaction Volume Surges Despite Price Adjustments

IPv4.Global The market for IPv4 addresses, already constrained by finite supply is undergoing a period of subtle yet significant transition. Data from IPv4.Global's July 2025 report reveals a continuing decline in average prices per address - particularly among larger blocks - even as transaction volume sees a notable surge. more

Best Attack Surface Monitoring Tools

Attaxion A whopping 600 million cyberattacks every single day - that's what organizations face nowadays, according to the Microsoft Digital Defense Report. The sheer volume of threats, coupled with the expanding attack surfaces resulting from digital transformation, scaling, and other factors, has made attack surface monitoring a must even for organizations that were previously happy with a more traditional vulnerability management approach. more

A DNS Exploration of the Latest Educated Manticore Attack

WhoisXML API Check Point Research published an in-depth analysis of the recent spearphishing attack launched by Iranian threat group Educated Manticore. The attackers targeted Israeli journalists, high-profile cybersecurity experts, and computer science professors from leading Israeli universities. more

Global Domain Activity Trends Seen in Q2 2025

WhoisXML API WhoisXML API analyzed 26.0+ million domains registered between 1 April and 30 June 2025 from the Newly Registered Domains (NRDs) Data Feed. We found out that the number of NRDs increased by 11.0% compared with the previous quarter. more

Radix selects Tucows Registry as Back-End Registry Services Provider

Radix Tucows Inc. (NASDAQ: TCX, TSX: TC), a global provider of internet services, and Radix, one of the world's largest portfolio registries, announced today that Tucows Registry, part of the company's Tucows Domains operating segment, has been awarded the contract to provide back-end registry services to Radix. more

Beneath the Belly of the Latest BlueNoroff Attack: A DNS Investigation

WhoisXML API Huntress was alerted to the recent BlueNorroff attack when an end-user reported potentially downloading a malicious Zoom extension on 11 June 2025. As it turned out, the malware came disguised as a Calendly meeting invite from a supposed contact sent via Telegram. more

Rounding Up DNS Facts about Operation RoundPress

WhoisXML API The Cybersecurity & Infrastructure Security Agency (CISA) added CVE-2025-32433 and CVE-2024-42009 to the Known Exploited Vulnerabilities (KEV) Catalog on 9 June 2025 after they were reportedly abused by APT28 to hack government webmail servers in an operation dubbed "RoundPress." more

DNIB Reports 371.7 Million Domain Name Registrations in Q2 2025

DNIB.com The second quarter of 2025 closed with 371.7 million domain name registrations across all top-level domains (TLDs), an increase of 9.3 million domain name registrations compared to the second quarter of 2024, according to the latest issue of the Domain Name Industry Brief Quarterly Report released Thursday at DNIB.com. more

IPv4 Address Prices Fall as Supply Surges

IPv4.Global After years of steady ascent, the market for IPv4 addresses is experiencing an uncharacteristic softening. According to new data from IPv4.Global by Hilco Streambank, the average monthly price per address has declined across all block sizes, with the most striking plunge seen in the larger /16 blocks. more

Baring the DNS Traces of the Slow Pisces Attack on Cryptocurrency Developers

WhoisXML API Palo Alto Unit 42 reported on the latest Slow Pisces attack that engaged with cryptocurrency developers on LinkedIn. The threat actors posed as potential employers and sent malware disguised as coding challenges. Developers who took on the challenge ended up running a compromised project, infecting their systems with RN Loader and RN Stealer. more

Industry Guides

Dedicated IP VPN: Complete Guide, Benefits, Setup & More

What is a Dedicated IP VPN? A Dedicated IP VPN is a Virtual Private Network (VPN) service that provides users with a unique, static IP address assigned exclusively to them. Unlike a shared IP address, which is used by multiple users simultaneously, a dedicated IP is reserved for a single user, offering greater control and security over their online activities. more

Starlink Internet Service (2024 Review)

Starlink provides high-speed, low-latency satellite internet, making it ideal for rural and remote areas lacking traditional broadband. Installation is user-friendly, and coverage continues to expand globally. However, the service is relatively expensive, and performance can be impacted by adverse weather. Overall, Starlink is a reliable choice for those without access to conventional internet options. more

Can ISPs See My VPN? (All You Need to Know)

ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more

What is Satellite Internet? (Complete Guide, Costs, Providers, and More)

Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more

Does NordVPN Still Work With Netflix? How to Use It and Fix It If Not Working

Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more

How to Get NordVPN Free Trial (Risk-Free Options for 2024)

NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more

NordVPN Review 2024: Is It Fast, Secure, and Worth It?

NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more

Best VPN Countries for Privacy, Speed, and Streaming (2024)

The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more

Why Are VPNs Important for Remote Work?

VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more

How Does a VPN Protect You?

A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more