Search
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
Search
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
Community
SecuritySnacks
Research
Podcast Episodes
Request an Invite
Recently Added
Cloud Security
DNS
Generative AI
Ransomware
Cybersecurity Reading List - Week of 2025-08-25
The sun has come for us, in the US. We escaped the desert only to trudge back into summer heat. But all is not lost - some...
Google
Malware
SpyNote
Threat Intelligence
SpyNote Malware Part 2
Deceptive websites are mimicking popular Android application install pages on the Google Play Store to lure victims into...
DNS
LummaStealer
Malware
Threat Intelligence
Hunting for Malware Networks
Hunting for new malware delivery infrastructure often entails the identification and tracking of common techniques to deliver...
SecuritySnacks
View all
Cybersecurity Reading List - Week of 2025-08-25
The sun has come for us, in the US. We escaped the desert only to trudge back into summer heat. But all is not lost - some...
Hunting for Malware Networks
Hunting for new malware delivery infrastructure often entails the identification and tracking of common techniques to deliver...
Hacker Summer Camp Recap - A Snick Snack
What do scavenger hunts, malware, and wildcards have in common?
Research
View all
SpyNote Malware Part 2
Deceptive websites are mimicking popular Android application install pages on the Google Play Store to lure victims into...
From Laptops to Laundromats: How DPRK IT Workers Infiltrated the Global Remote Economy
This report maps the entire ecosystem of a DPRK IT worker infiltration scheme: key actors, GitHub aliases, laundering flows,...
Chinese Malware Delivery Domains: Part III
This report details an ongoing campaign by an actor operating primarily during Chinese time zone working hours, targeting...
Podcast Episodes
View all
How Russian Disinformation Campaigns Exploit Domain Registrars and AI
In this episode of the Breaking Badness Cybersecurity Podcast, Kali Fencl, Daniel Schwalbe, and guest Scot Terban discuss...
Book Club with Dmitri Alperovitch
This week Kali Fencl is joined by Tim Chen, and Executive Chairman of the Silverado Policy Accelerator and co-founder of...
Call to ARMs
Episode 182 of Breaking Badness is here! This week Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce discuss Palo Alto’s...