Cyber risk of internet domain registration system overlooked, official says

SCM feed for Latest

Overview

Matt Noyes, the Cyber Policy and Strategy Director for the U.S. Secret Service, has pointed out that the internet domain registration system is often overlooked as a potential target for cyberattacks. He emphasizes that this system poses significant cybersecurity risks that could be exploited by attackers. The lack of attention to this area means that both businesses and individuals could be vulnerable to domain-related threats, which could lead to issues like domain hijacking or phishing attacks. Noyes's comments serve as a warning for organizations to reassess their security measures around domain registration and management, as neglecting this aspect could have serious consequences for their online presence and data integrity.

Key Takeaways

  • Affected Systems: Internet domain registration system
  • Action Required: Organizations should enhance their security protocols for domain registration, including implementing two-factor authentication and regularly monitoring their domain registrations.
  • Timeline: Newly disclosed

Original Article Summary

CyberScoop reports that the internet domain registration system has been noted by U.S. Secret Service Cyber Policy and Strategy Director Matt Noyes to be a neglected attack vector despite the cybersecurity risks it brings.

Impact

Internet domain registration system

Exploitation Status

No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.

Timeline

Newly disclosed

Remediation

Organizations should enhance their security protocols for domain registration, including implementing two-factor authentication and regularly monitoring their domain registrations.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Phishing.

Related Coverage

Global Threat Map: Open-source real-time situational awareness platform

Help Net Security

The Global Threat Map is an open-source initiative designed to provide security teams with real-time visibility of cyber incidents worldwide. It aggregates various open data feeds into an interactive map that displays key indicators like malware spread, phishing attempts, and attack traffic based on geographic location. Unlike traditional threat maps, which are often produced by security vendors, this project relies on community contributions to maintain and update the data. This platform is particularly valuable for organizations looking to enhance their situational awareness and respond to emerging threats more effectively. By utilizing open-source data, it fosters collaboration among security professionals and helps them stay informed about the latest cyber activities that could impact their operations.

Feb 4, 2026

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

The Hacker News

The Eclipse Foundation has decided to implement mandatory security checks for extensions intended for the Open VSX Registry, which is used with Microsoft Visual Studio Code (VS Code). This initiative aims to prevent malicious extensions from being published, marking a proactive shift in how the foundation addresses security risks related to supply chain attacks. By requiring these checks before publication, the foundation hopes to enhance the safety of the open-source ecosystem and protect developers and users from potentially harmful software. This change is significant as it reflects a growing awareness of the vulnerabilities associated with software supply chains, especially in widely used development tools like VS Code.

Feb 4, 2026

Ransomware surge prompts FCC guidance for stronger telecom security practices

SCM feed for Latest

The Federal Communications Commission (FCC) is urging telecom companies to enhance their cybersecurity practices in response to a rise in ransomware attacks. The FCC emphasizes that implementing basic security measures, such as regularly updating software, using multifactor authentication, and segmenting networks, can greatly reduce the risk of falling victim to these attacks. This guidance comes as ransomware continues to pose a significant threat to the telecommunications sector, which plays a crucial role in national infrastructure. By adopting these recommended practices, telecom providers can better protect sensitive customer data and ensure the reliability of their services. The FCC's advice serves as a timely reminder for the industry to stay vigilant against evolving cyber threats.

Feb 4, 2026

Denmark subjected to sweeping Russian cyberattack threats

SCM feed for Latest

Denmark is facing a significant cyber threat from a pro-Russian hacker group known as the Russian Legion. This group has declared intentions to launch large-scale cyber intrusions in response to Denmark's plans to provide military aid to Ukraine. The threat underscores the ongoing tensions between Russia and countries supporting Ukraine, marking a potential escalation in cyber warfare tactics. As Denmark prepares for these potential attacks, the government and cybersecurity agencies will need to bolster their defenses to protect critical infrastructure and sensitive data. This situation serves as a reminder of the complex relationship between geopolitical events and cybersecurity risks.

Feb 4, 2026

Negotiating with Scattered Lapsu$ Hunters discouraged

SCM feed for Latest

Experts from Unit 221B have issued a warning to organizations targeted by the Scattered Lapsus$ Hunters hacking group. They advise against negotiating with these attackers, as doing so can lead to intensified extortion attempts and victim harassment. Additionally, there is a strong likelihood that the attackers will not fulfill any promises to return stolen data. This situation raises concerns for companies that may be tempted to pay ransoms, as the risks associated with negotiation appear to outweigh any potential benefits. Organizations must be aware of these tactics and consider alternative strategies for addressing such incidents.

Feb 3, 2026

Cantwell claims telecoms blocked release of Salt Typhoon report

CyberScoop

Senator Maria Cantwell from Washington is pushing for hearings to investigate how AT&T and Verizon have responded to recent cyberattacks targeting telecom networks. She claims that these companies have obstructed the release of a report known as Salt Typhoon, which likely contains critical information about the hacks. Cantwell's calls for transparency come amid growing concerns about the security of telecommunication infrastructure, especially as it plays a vital role in national security and everyday communications. The outcome of these hearings could lead to increased accountability for telecom companies in how they protect their networks and respond to breaches.

Feb 3, 2026