Recent Articles

The Monday Media Wrap Up

The Monday Media Wrap Up

| July 25, 2016 | 0 Comments

Articles from July 18-21 Trojan Delilah Recruits Malicious Insiders Via Extortion Info Security Magazine | Phil Muncaster | July 18, 2016 Organizations have been warned of a rise in insider threats after a new trojan was revealed which is specifically designed to gather information on targeted victims so that malware authors can blackmail them into […]

Continue Reading

When Work Works Award

When Work Works Award

| July 20, 2016 | 0 Comments

We are pleased to announce that DomainTools has been honored by the When Work Works organization. This award honors organizations that have created effective workplaces based on six evidence-based components that are linked with positive employee and employer outcomes: Work/life fit Supervisor support for work success Autonomy Satisfaction with earnings, benefits and opportunities for advancement Opportunities for learning Culture […]

Continue Reading

The Monday Media Wrap Up

The Monday Media Wrap Up

| July 11, 2016 | 0 Comments

Articles from July 9-15 Another reason why paying a ransomware threat isn’t worth it IT World Canada | Howard Solomon | July 12, 2016 Ransomware victims willing to talk to the press sometimes suggest there is “honor among thieves” if they’ve been able to recover their encrypted machines, particularly if the attackers help them through […]

Continue Reading

DomainTools 101: The IP Crowd

DomainTools 101: The IP Crowd

| July 11, 2016 | 0 Comments

I recently read a couple of great blog posts about the breach that occurred at the Democratic National Committee. These posts go into greater detail about Spear Phishing and how the threat actors go about breaching you and your company. I would really recommend reading both of them. The first article is written by Crowdstrike, […]

Continue Reading

The Monday Media Wrap Up

The Monday Media Wrap Up

| July 11, 2016 | 0 Comments

Articles from July 2-8 Operationalizing threat intelligence Network World | Jon Oltsik | July 5, 2016 In 2015, I conducted some in-depth research around enterprise organizations’ consumption, use and sharing of threat intelligence. Time and time again, I heard cybersecurity professionals proclaim that their organizations had to do a better job “operationalizing” threat intelligence. ESG […]

Continue Reading

Our First FIRST (Conference)

Our First FIRST (Conference)

| July 5, 2016 | 0 Comments

The 28th annual FIRST Conference was held in Seoul a couple of weeks back, and a contingent from DomainTools was in attendance, as a sponsor (DT itself) and as a speaker (yours truly). Based on our experiences there, I daresay it won’t be our last time at FIRST–it’s a good conference, with pertinent content, good […]

Continue Reading

The Monday Media Wrap Up

The Monday Media Wrap Up

| June 27, 2016 | 0 Comments

Articles from June 18-24 More Evidence Links Russia to DNC Attack Security Week | Eduard Kovacs | June 21, 2016 Several security firms have found evidence that the recent attacks against the Democratic National Committee (DNC), the formal governing body for the U.S. Democratic Party, were launched by Russia-linked threat groups. CrowdStrike, which assisted the […]

Continue Reading

Empower your proxy logs with the DomainTools App for Splunk

Empower your proxy logs with the DomainTools App for Splunk

| June 22, 2016 | 0 Comments

Today, we are announcing the release of a DomainTools app for Splunk that will help teams leverage their proxy and DNS logs for threat hunting, incident response and quick, in-context triage of security events. Those sources of internal threat intelligence are finally getting the recognition they deserve, and rightly so: the domain names they contain […]

Continue Reading

The Monday Media Wrap Up

The Monday Media Wrap Up

| June 20, 2016 | 0 Comments

Articles from June 11-17 ‘Guccifer 2.0’ claims glory for DNC Hack, more documents leaked SC UK | Max Metzger | June 17, 2016 A hacker claiming access to the servers of the Democratic National Committee (DNC) has posted more internal documents. Guccifer 2.0 has claimed responsibility and added that it was him and only him […]

Continue Reading

Go Phish: How the English Language Helps Threat Actors

Go Phish: How the English Language Helps Threat Actors

| June 14, 2016 | 0 Comments

There is no getting around it. Even though it is a language built on rigid rules, there are so many exceptions, words that are close in meaning, sound and usage, it is common to make grammatical errors. Not so surprisingly, threat actors deploying phishing campaigns often use these grammatical imperfections to their advantage. A typical […]

Continue Reading