Search
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
DomainTools Investigation Newsletter Registration
DomainTools Investigation Newsletter Registration TYP
Closed Door Session TYP
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
DomainTools Investigation Newsletter Registration
DomainTools Investigation Newsletter Registration TYP
Closed Door Session TYP
Search
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
DomainTools Investigation Newsletter Registration
DomainTools Investigation Newsletter Registration TYP
Closed Door Session TYP
Community
SecuritySnacks
Research
Newsletters
Podcast Episodes
Request an Invite
Recently Added
China
Digital Surveillance
Threat Intelligence
Inside the Great Firewall Part 1: The Dump
Analysis of the 500GB+ Great Firewall data breach revealing China’s state censorship network, VPN evasion tactics, and...
Community
Tenth Newsletter Freeze-Out
Cybersecurity deep dive: NPM Phishing, Crypto Scams, & 18+ E-Crime analysis. Get expert research on supply chain attacks,...
Community
DNS
Threat Intelligence
Cybersecurity Reading List - Week of 2025-10-27
Commentary followed by links to cybersecurity articles that caught our interest internally.
SecuritySnacks
View all
Cybersecurity Reading List - Week of 2025-10-27
Commentary followed by links to cybersecurity articles that caught our interest internally.
DomainTools Investigations BSides NoVa Recap
Ian Campbell's recap of DTI's participation at BSides NoVa
SecuritySnack: Repo The Repo - NPM Phishing
A deep dive into the 4-stage NPM phishing attack flow that led to high-profile repository account takeover. Protect your...
Research
View all
Inside the Great Firewall Part 1: The Dump
Analysis of the 500GB+ Great Firewall data breach revealing China’s state censorship network, VPN evasion tactics, and...
Inside a Crypto Scam Nexus
A massive crypto wallet-drain conspiracy links fake trading sites to a single criminal IP address. See our investigative...
Inside Salt Typhoon: China’s State-Corporate Advanced Persistent Threat
Salt Typhoon is a Chinese state-sponsored cyber threat group aligned with the Ministry of State Security (MSS), specializing...
Newsletters
View all
Tenth Newsletter Freeze-Out
Cybersecurity deep dive: NPM Phishing, Crypto Scams, & 18+ E-Crime analysis. Get expert research on supply chain attacks,...
Newsletter Number 9, Keep On Movin' Down The Line
My team has been on a tear this month, we've published new research on Salt Typhoon, an advanced Chinese APT, and we've analyzed...
Eight Days a Newsletter: I lo-o-o-ove research!
If you are a returning reader, welcome back! If you are a new reader, what you are about to read is news from our group of...
Podcast Episodes
View all
How Russian Disinformation Campaigns Exploit Domain Registrars and AI
In this episode of the Breaking Badness Cybersecurity Podcast, Kali Fencl, Daniel Schwalbe, and guest Scot Terban discuss...
Book Club with Dmitri Alperovitch
This week Kali Fencl is joined by Tim Chen, and Executive Chairman of the Silverado Policy Accelerator and co-founder of...
Call to ARMs
Episode 182 of Breaking Badness is here! This week Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce discuss Palo Alto’s...