Blog
Articles, interviews, and useful tips to help you with everything from starting a Premium Anycast DNS project to securing your organization against cyberthreats.
Articles, interviews, and useful tips to help you with everything from starting a Premium Anycast DNS project to securing your organization against cyberthreats.
The internet powers our world - but it also fuels cybercrime. Every day, phishing campaigns, malware, and botnets target businesses and individuals alike. Combating this scale of threat requires constant vigilance, collaboration, and intelligence sharing. At Excedo Networks | Security Operations Center | Digital Crimes Unit (DCU), we are on the frontlines of this battle. Our team operates 24/7/365, detecting and disrupting internet-related crimes in real time. Because when cybercriminals do not rest, neither can we.
The upcoming Swedish Cybersecurity Act, which is based on the EU's NIS2 Directive, is often described as yet another heavy burden on organizations. But I would like to challenge that view. In fact, this law could mark the beginning of a new era: one in which cybersecurity is no longer a side issue, but a strategic opportunity and a key to competitiveness.
On August 23, 2025, IT supplier Miljödata AB was hit by a major cyberattack that knocked out important HR systems in over 160 Swedish municipalities and several regions. Miljödata supplies the Adato rehabilitation and HR system, which is used by 80% of Sweden's municipalities. The attack resulted in the theft of personal data for over one million Swedish citizens—including names, personal identification numbers, addresses, and contact details—linked to employees in municipalities such as Stockholm, Gothenburg, Linköping, and others.
Cloudflare is a linchpin of the modern Internet’s infrastructure, yet its “content-neutral” stance has repeatedly allowed phishing, malware, and extremist sites to hide behind its network. Security researchers warn that about 10.05% of all spam/malicious domains use Cloudflare’s nameservers, and that attackers routinely move flagged domains behind Cloudflare to “disguise the backend.”
Domain registrars that allow domains to be registered without any kind of identification required make it very easy for cybercriminals to commit crimes in complete anonymity. Unfortunately, there are many of these rogue registrars around and they are endangering businesses and people by not implementing industry standards and best practices.
The NIS2 Directive places new requirements on domain name registrars to get accurate information on registrants in order to minimise the anonymity that enables cybercrime.
BIMI (Brand Indicators for Message Identification) is a way to quickly show email recipients that emails actually originate from your organization. It allows you to add your brand logo to all outgoing emails so recipients can trust that they come from you and not a malicious third party.
Excedo's mission has always been to protect businesses and people online. This requires a holistic approach covering everything from email security and domain management to threat intelligence.
The requirements of the NIS2 Directive are extensive and address many different aspects of digital security, including email security. For organizations to meet the email security standards set by NIS2, they need a correctly configured DMARC policy.
Anycast DNS provides the online resilience required by the NIS2 Directive. It ensures online resources and services are always available even when attacks do happen by providing multiple routing options that make it possible to filter out malicious traffic.
Implementing a DMARC policy for very small organizations is not too complex. Generally, one just needs to ensure it is implemented correctly for a single domain. However, for larger organizations, with multiple domains and email systems, it is much more complicated.
The NIS2 Directive will raise digital security levels across the EU. Although its jurisdiction spans across borders, individual countries have a say in how the requirements will be implemented locally and if they want to go above and beyond the security baseline set by NIS2.
DDoS (Distributed Denial of Service) attacks threaten the availability of essential services and systems worldwide. The first step to protection is to understand what these attacks look like and what vulnerabilities they exploit.
There are many reasons to secure and closely control your digital IP. An important reason is to protect your organization from online brand abuse, where malicious third parties use your brand name to commit fraud.
The default settings of most major email providers have for a long time not been enough to stop email threats from reaching inboxes. But that is now changing with Google and Yahoo's new email security requirements, including the mandatory implementation of DMARC.
A DMARC (Domain-based Message Authentication, Reporting, and Conformance) policy is a key part of organizational email security. It prevents email threats from reaching your employees and users, and it is now a requirement by major email providers like Gmail and Yahoo.
Jan Stenbecks torg 17
164 40 KISTA
SWEDEN