Customer Resource Page

DomainTools Reports

Zero Trust and DomainTools

DomainTools variety of tools and data to help security teams in their Zero Trust initiatives.

The Economic Benefits of DomainTools Internet Intelligence

Earlier detection and more comprehensive domain intelligence from DomainTools avoids organizational risk and improves security team efficiency, helping teams identify more malicious threats faster.

SANS Top New Attacks and Threat Report

Read this report for a baseline of statistics from reliable sources of breach and malware data as well as summarized expert advice detailing the emerging threats to look out for in 2022 and beyond.

IPV4 Address Space in DNSDB

In this White Paper, we update and extend an earlier IPv4 study to focus on the aggregated cache miss counts associated with each /24 netblock for the entire Internet IPv4 space.

Domains That Begin With A Digit

Risk management is central to modern operational cybersecurity practice. This comparative case study looks at risk scores for domains whose names begin with a digit, aggregating and visualizing those risk scores on an autonomous system-by-autonomous system basis using violin plots.

Dealing With Short Search Terms

Farsight Security's DNSDB® Flexible Search enables users to cover more ground in passive DNS searches and this whitepaper exposes users to issues that can arise.

Comparing Images Such as Screenshots Using Perceptual Hashes

While investigating websites, analysts often acquire images, either as individual files from the sites or as screenshots (perhaps from Iris Investigate). The question is then "Can we identify images that are similar to each other?" Perceptual hashes are a popular approach to assessing visual similarity.

Best Practices: How to Leverage Domain and DNS Intelligence for OEMs

Download this eBook to learn more about how OEMs benefit from licensing and integrating with DomainTools Intelligence Feeds, Monitors, APIs, and Farsight DNSDB query capabilities.

Building a Secure VPS Server Under Debian 11

In this report, we discuss the details necessary to bring up a functional and secure Virtual Private Server (VPS).

Best Practices Guide Federal Government

The government sector is not immune to the evolution of cyber threats. In this best practices guide, DomainTools shares how security teams are making effective use of adversary infrastructure analysis to gain an edge.

Best Practice Guide Retail

In this Best Practices Guide, we offer insights into the cyber threats facing the retail sector, what the landscape looks like for defenders, and how security teams are makingeffective use of adversary infrastructure analysis to gain an edge.

Best Practice Guide Financial Services

In this Best Practices Guide, we offer insights into the cyber threats facing the financial sector, what the landscape looks like for defenders, and how security teams are making effective use of adversary infrastructure analysis to gain an edge.

White Paper: DNS Forensics: Where Intuition Meets Experience
Whois
Why Retailers Are Losing The Fight Against Online Counterfeiting
Threat Intelligence Playbook: Making Sense of Indicators
The Value of Threat Intelligence with DomainTools: Identify Threats 82% Faster
The Value of Threat Intelligence
The Rise of Threat Hunting and Why it Matters
Strategies to Vet Your Threat Intelligence and Reduce False Positives
SANS 2021 Top New Attacks and Threat Report
SANS 2021 Report: Top Skills Analysts Need to Master
Protected Waters: No Spear Phishing Allowed
Post-GDPR Security Investigations
Powering Incident Response by Operationalizing Threat Intelligence
Hunting RATs (Remote Access Trojans)
How Whois Data Ensures a Safe and Secure Internet
Formulating a Robust Pivoting Methodology
Developing a Threat Hunting Program Checklist: A 5-Step Guide
Detecting Malicious Domains Using Artificial Intelligence and Machine Learning
Defending Against Malicious JavaScript Attacks
Cybersecurity Outlook for 2018
Conceptualizing a Continuum of Cyber Threat Attribution
Carpe Diem: How to Seize the Phish
The Impact of the SolarWinds Breach on Cybersecurity
The 2021 Threat Hunting Report
The 2020 Threat Hunting Report
The 2019 Threat Hunting Report
Survey Report: 2020 Cybersecurity Report Card
Survey Report: 2019 Cybersecurity Report Card
Survey Report: 2018 Cybersecurity Report Card
Survey Report: 2017 Threat Monitoring, Detection and Response
SANS 2021 Threat Hunting Survey
SANS 2020 Threat Hunting Survey
SANS 2020 Cyber Threat Intelligence Survey
SANS 2019 Cyber Threat Hunting Survey
SANS 2018 Cyber Threat Hunting Survey
SANS 2019 Incident Response Survey Report
SANS 2019 Cyber Threat Intelligence Survey
SANS 2018 Cyber Threat Intelligence Survey
Ponemon Survey Report: Staffing the IT Security Function in the Age of Automation
EMA Security Megatrends Report
EMA Radar for Digital Threat Intelligence Management: Q4 2017
2018 Threat Hunting Report
2019 Ponemon Survey Report: Staffing the IT Security Function in the Age of Automation
2020 SANS Automation and Integration Survey
2020 Ponemon Survey Report: Staffing the IT Security Function in the Age of Automation
2018 Threat Intelligence Report
2018 Osterman Research: Best Practices for Protecting Against Phishing, Ransomware and Email Fraud