Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-08-18DomainToolsDomainTools Research
A Sticky Situation Part 2
2022-05-05DomainToolsDomainTools Research
A Sticky Situation Part 1: The Pervasive Nature of Credit Card Skimmers
2022-04-19DomainToolsIan Campbell
Stop Crypto Kleptos in Their Tracks
2022-04-07DomainToolsDomainTools
SPM55: Ascending the Ranks of Indonesian Phishing As A Service Offerings
2021-07-28DomainToolsChad Anderson
Finding AnchorDNS C2s With Iris Investigate
AnchorDNS
2021-07-15DomainToolsChad Anderson
American Rescue Plan Act Lures in the Wild
2021-07-01DomainToolsChad Anderson
The Most Prolific Ransomware Families: A Defenders Guide
REvil Conti Egregor Maze REvil
2021-06-10DomainToolsChad Anderson
Cloud Atlas Navigates Us Into New Waters
2021-05-25DomainToolsTim Helming
Indicators Over Cocktails: Exporting Indicators from Iris (UNC1151)
2021-05-13DomainToolsJohn “Turbo” Conwell, Tim Helming
Domain Blooms: Identifying Domain Name Themes Targeted By Threat Actors
2021-05-13DomainToolsJohn “Turbo” Conwell, Tim Helming
Domain Blooms: Identifying Domain Name Themes Targeted By Threat Actors
2021-04-29DomainToolsChad Anderson
DomainTools And Digital Archeology: A Look At RotaJakiro
RotaJakiro
2021-04-29DomainToolsJoe Slowik
Leaping Down a Rabbit Hole of Fraud and Misdirection
2021-04-27DomainToolsChad Anderson
Winter Vivern: A Look At Re-Crafted Government MalDocs Targeting Multiple Languages
Winter Vivern
2021-04-22DomainToolsJoe Slowik
An Undersea Royal Road: Exploring Malicious Documents and Associated Malware
2021-04-01DomainToolsJoe Slowik
COVID-19 Phishing With a Side of Cobalt Strike
Cobalt Strike
2021-03-10DomainToolsJoe Slowik
Examining Exchange Exploitation and its Lessons for Defenders
CHINACHOPPER
2021-03-03DomainToolsJoe Slowik
Centreon to Exim and Back: On the Trail of Sandworm
Exaramel PAS
2021-02-25DomainToolsJoe Slowik
The Continuous Conundrum of Cloud Atlas
2021-02-11DomainToolsJoe Slowik
Visibility, Monitoring, and Critical Infrastructure Security
Industroyer Stuxnet Triton