Q2 2026 — The unlicensed gambling SEO economy.
3,745 attacker domains mapped to 18 operator clusters. Geographic concentration, hosting attribution, registrar choke-points, victim sector breakdown and projected disruption windows.
AbuseRadar publishes quarterly threat briefings, methodology notes and structured datasets on active operator stacks compromising government, academic and public-sector infrastructure. Free for CERT teams, journalists and academic researchers; everyone else by request.
3,745 attacker domains mapped to 18 operator clusters. Geographic concentration, hosting attribution, registrar choke-points, victim sector breakdown and projected disruption windows.
82 active municipal and central-government compromises tracked across 11 jurisdictions. Time-to-detection, time-to-remediation and recurrence rates.
247 active higher-education compromises. CMS provenance, faculty-page pattern, operator overlap with the gambling stack, recommended audit playbook.
How AbuseRadar's verification stack renders compromised pages exactly as the attacker serves them — including the failure modes of common SEO tools.
3,745 attacker domains, operator cluster IDs, first-seen / last-seen dates, target sector mix. CSV + JSON. Updated weekly. Free for CERT and academic use.
Investigative journalists working a compromise story: AbuseRadar will share the underlying evidence bundle, attacker attribution and timeline under embargo. We do not pitch.
Email-only. Four times a year. Each issue: top operator stacks, sector compromise rates, takedown wins and one deep-dive case study.