<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with ens]]></title><description><![CDATA[A list of topics that have been tagged with ens]]></description><link>https://board.circlewithadot.net/tags/ens</link><generator>RSS for Node</generator><lastBuildDate>Thu, 09 Apr 2026 10:53:54 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/ens.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[How Criminals Can Exploit the Blockchain Name Space]]></title><description><![CDATA[How Criminals Can Exploit the Blockchain Name SpaceOn March 19, Wired published an article on how the US Justice Department and law enforcement agencies of collaborating countries took down the command-and-control of several botnets that were used for a huge number of cyberattacks, such as Distributed Denial of Service attacksIn this article, Interisle's Andy Malis look at botnets generally and how they exploit the DNS. He thens looks at a variation of the conventional botnet exploitation of the DNS that leverages the name space for Ethereum blockchain.https://interisle.substack.com/p/how-criminals-can-exploit-the-blockchain#botnet #malware #ethereum #ENS #blockchain #DNS]]></description><link>https://board.circlewithadot.net/topic/1531b50f-f49b-4d0a-a8dc-791728b4d31e/how-criminals-can-exploit-the-blockchain-name-space</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/1531b50f-f49b-4d0a-a8dc-791728b4d31e/how-criminals-can-exploit-the-blockchain-name-space</guid><dc:creator><![CDATA[securityskeptic@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>