Search
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
DomainTools Investigation Newsletter Registration
DomainTools Investigation Newsletter Registration TYP
Closed Door Session TYP
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
DomainTools Investigation Newsletter Registration
DomainTools Investigation Newsletter Registration TYP
Closed Door Session TYP
Search
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
DomainTools Investigation Newsletter Registration
DomainTools Investigation Newsletter Registration TYP
Closed Door Session TYP
Community
SecuritySnacks
Research
Podcast Episodes
Request an Invite
Recently Added
cryptocurrency
PoisonSeed
SCATTERED SPIDER
Threat Intelligence
Newly Identified Domains Likely Linked to Continued Activity from PoisonSeed E-Crime Actor
DomainTools Investigations identified a set of malicious domains registered since 01 June 2025 likely linked to the ecrime...
APT43
China
Cyber Espionage
North Korea
Inside the Kimsuky Leak: How the “Kim” Dump Exposed North Korea’s Credential Theft Playbook
A rare and revealing breach attributed to a North Korean-affiliated actor, known only as “Kim” as named by the hackers...
Cloud Security
DNS
Generative AI
Ransomware
Cybersecurity Reading List - Week of 2025-08-25
The sun has come for us, in the US. We escaped the desert only to trudge back into summer heat. But all is not lost - some...
SecuritySnacks
View all
Cybersecurity Reading List - Week of 2025-08-25
The sun has come for us, in the US. We escaped the desert only to trudge back into summer heat. But all is not lost - some...
Hunting for Malware Networks
Hunting for new malware delivery infrastructure often entails the identification and tracking of common techniques to deliver...
Hacker Summer Camp Recap - A Snick Snack
What do scavenger hunts, malware, and wildcards have in common?
Research
View all
Newly Identified Domains Likely Linked to Continued Activity from PoisonSeed E-Crime Actor
DomainTools Investigations identified a set of malicious domains registered since 01 June 2025 likely linked to the ecrime...
Inside the Kimsuky Leak: How the “Kim” Dump Exposed North Korea’s Credential Theft Playbook
A rare and revealing breach attributed to a North Korean-affiliated actor, known only as “Kim” as named by the hackers...
SpyNote Malware Part 2
Deceptive websites are mimicking popular Android application install pages on the Google Play Store to lure victims into...
Podcast Episodes
View all
How Russian Disinformation Campaigns Exploit Domain Registrars and AI
In this episode of the Breaking Badness Cybersecurity Podcast, Kali Fencl, Daniel Schwalbe, and guest Scot Terban discuss...
Book Club with Dmitri Alperovitch
This week Kali Fencl is joined by Tim Chen, and Executive Chairman of the Silverado Policy Accelerator and co-founder of...
Call to ARMs
Episode 182 of Breaking Badness is here! This week Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce discuss Palo Alto’s...