Customer Resource Page
DomainTools Reports
DomainTools variety of tools and data to help security teams in their Zero Trust initiatives.
Earlier detection and more comprehensive domain intelligence from DomainTools avoids organizational risk and improves security team efficiency, helping teams identify more malicious threats faster.
Read this report for a baseline of statistics from reliable sources of breach and malware data as well as summarized expert advice detailing the emerging threats to look out for in 2022 and beyond.
In this White Paper, we update and extend an earlier IPv4 study to focus on the aggregated cache miss counts associated with each /24 netblock for the entire Internet IPv4 space.
Risk management is central to modern operational cybersecurity practice. This comparative case study looks at risk scores for domains whose names begin with a digit, aggregating and visualizing those risk scores on an autonomous system-by-autonomous system basis using violin plots.
Farsight Security's DNSDB® Flexible Search enables users to cover more ground in passive DNS searches and this whitepaper exposes users to issues that can arise.
While investigating websites, analysts often acquire images, either as individual files from the sites or as screenshots (perhaps from Iris Investigate). The question is then "Can we identify images that are similar to each other?" Perceptual hashes are a popular approach to assessing visual similarity.
Download this eBook to learn more about how OEMs benefit from licensing and integrating with DomainTools Intelligence Feeds, Monitors, APIs, and Farsight DNSDB query capabilities.
In this report, we discuss the details necessary to bring up a functional and secure Virtual Private Server (VPS).
The government sector is not immune to the evolution of cyber threats. In this best practices guide, DomainTools shares how security teams are making effective use of adversary infrastructure analysis to gain an edge.
In this Best Practices Guide, we offer insights into the cyber threats facing the retail sector, what the landscape looks like for defenders, and how security teams are makingeffective use of adversary infrastructure analysis to gain an edge.
In this Best Practices Guide, we offer insights into the cyber threats facing the financial sector, what the landscape looks like for defenders, and how security teams are making effective use of adversary infrastructure analysis to gain an edge.
