Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-01-22DomainToolsJoe Slowik
Change in Perspective on the Utility of SUNBURST-related Network Indicators
SUNBURST
2021-01-14DomainToolsJoe Slowik
The Devil’s in the Details: SUNBURST Attribution
SUNBURST
2021-01-06DomainToolsJoe Slowik
Holiday Bazar: Tracking a TrickBot-Related Ransomware Incident
BazarBackdoor TrickBot
2021-01-01DomainToolsJoe Slowik
Conceptualizing a Continuum of Cyber Threat Attribution
CHINACHOPPER SUNBURST
2020-12-18DomainToolsJoe Slowik
Continuous Eruption: Further Analysis of the SolarWinds Supply Chain Incident
SUNBURST
2020-12-14DomainToolsJoe Slowik
Unraveling Network Infrastructure Linked to the SolarWinds Hack
SUNBURST
2020-12-08DomainToolsJoe Slowik
Identifying Critical Infrastructure Targeting through Network Creation
2020-12-02DomainToolsJoe Slowik
Identifying Network Infrastructure Related to a World Health Organization Spoofing Campaign
Azorult Glupteba
2020-11-20DomainToolsBlack Lotus Labs, Joe Slowik, Lumen
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity
2020-11-20DomainToolsBlack Lotus Labs, Joe Slowik, Lumen
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity
2020-11-20DomainToolsBlack Lotus Labs, Joe Slowik, Lumen
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity
2020-11-18DomainToolsJoe Slowik
Analyzing Network Infrastructure as Composite Objects
Ryuk
2020-11-11DomainToolsJoe Slowik
Extrapolating Adversary Intent Through Infrastructure
2020-08-20ThreatConnectKyle Ehmke
[webinar] Proactive Infrastructure Hunting with ThreatConnect & DomainTools
2020-08-20DomainToolsChad Anderson
Revealing REvil Ransomware With DomainTools and Maltego
REvil
2020-02-06DomainToolsChad Anderson
Finding Additional Indicators With a SeaTurtle Deep Dive in Passive DNS Within DomainTools Iris
Sea Turtle
2017-03-21DomainToolsDomainTools
Hunt Case Study: Hunting Campaign Indicators on Privacy Protected Attack Infrastructure
CopyKittens