Search
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
DomainTools Investigation Newsletter Registration
DomainTools Investigation Newsletter Registration TYP
Closed Door Session TYP
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
DomainTools Investigation Newsletter Registration
DomainTools Investigation Newsletter Registration TYP
Closed Door Session TYP
Search
Home
Request an Invite
Thank You
old - Collaboration Submission
Thank You-Submission
DomainTools Investigation - Submit to Collaborate
DomainTools Investigation Newsletter Registration
DomainTools Investigation Newsletter Registration TYP
Closed Door Session TYP
Community
SecuritySnacks
Research
Newsletters
Podcast Episodes
Request an Invite
Recently Added
China
Digital Surveillance
Threat Intelligence
Inside the Great Firewall Part 3: Geopolitical and Societal Ramifications
Part 3 analyzes the GFW as geopolitical infrastructure: economic protectionism, the export of cyber sovereignty norms, and...
China
Digital Surveillance
Threat Intelligence
Inside the Great Firewall Part 2: Technical Infrastructure
See the Great Firewall's technical blueprint. DomainTools Investigations details the TSG core, packet interception methods,...
China
Digital Surveillance
Threat Intelligence
Inside the Great Firewall Part 1: The Dump
Analysis of the 500GB+ Great Firewall data breach revealing China’s state censorship network, VPN evasion tactics, and...
SecuritySnacks
View all
Cybersecurity Reading List - Week of 2025-10-27
Commentary followed by links to cybersecurity articles that caught our interest internally.
DomainTools Investigations BSides NoVa Recap
Ian Campbell's recap of DTI's participation at BSides NoVa
SecuritySnack: Repo The Repo - NPM Phishing
A deep dive into the 4-stage NPM phishing attack flow that led to high-profile repository account takeover. Protect your...
Research
View all
Inside the Great Firewall Part 3: Geopolitical and Societal Ramifications
Part 3 analyzes the GFW as geopolitical infrastructure: economic protectionism, the export of cyber sovereignty norms, and...
Inside the Great Firewall Part 2: Technical Infrastructure
See the Great Firewall's technical blueprint. DomainTools Investigations details the TSG core, packet interception methods,...
Inside the Great Firewall Part 1: The Dump
Analysis of the 500GB+ Great Firewall data breach revealing China’s state censorship network, VPN evasion tactics, and...
Newsletters
View all
Tenth Newsletter Freeze-Out
Cybersecurity deep dive: NPM Phishing, Crypto Scams, & 18+ E-Crime analysis. Get expert research on supply chain attacks,...
Newsletter Number 9, Keep On Movin' Down The Line
My team has been on a tear this month, we've published new research on Salt Typhoon, an advanced Chinese APT, and we've analyzed...
Eight Days a Newsletter: I lo-o-o-ove research!
If you are a returning reader, welcome back! If you are a new reader, what you are about to read is news from our group of...
Podcast Episodes
View all
How Russian Disinformation Campaigns Exploit Domain Registrars and AI
In this episode of the Breaking Badness Cybersecurity Podcast, Kali Fencl, Daniel Schwalbe, and guest Scot Terban discuss...
Book Club with Dmitri Alperovitch
This week Kali Fencl is joined by Tim Chen, and Executive Chairman of the Silverado Policy Accelerator and co-founder of...
Call to ARMs
Episode 182 of Breaking Badness is here! This week Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce discuss Palo Alto’s...