<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:admin="http://webns.net/mvcb/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
	<channel>
		<title>DomainTools</title>
		<atom:link href="https://www.domaintools.com/resources/blog/feed" rel="self" type="application/rss+xml" />
		<link>https://www.domaintools.com/resources/blog</link>
		<description>Innovative, Practical Advice to Improve your Cybersecurity Posture</description>
		<language>en-US</language>
		
		<item>
			<title><![CDATA[Can the Neurodiverse Community Help to Close the Cybersecurity Skills Gap?]]></title>
			<link>https://www.domaintools.com/resources/blog/can-the-neurodiverse-community-help-to-close-the-cybersecurity-skills-gap</link>
			<pubDate>Thu, 03 Sep 2020 08:00:00 -0700</pubDate>
			<dc:creator>968</dc:creator>
			<category>General Infosec</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/can-the-neurodiverse-community-help-to-close-the-cybersecurity-skills-gap</guid>
			<description><![CDATA[The staffing necessary to fight the ever-increasing cyber threats are harder to come by than ever. This blog is an exploration of how people who are neurotypical can provide much needed perspective and fill in-demand security roles.]]></description>
		</item>
		
		<item>
			<title><![CDATA[Cyber-Burnout: The Hidden Cost of a Security Career]]></title>
			<link>https://www.domaintools.com/resources/blog/cyber-burnout-the-hidden-cost-of-a-security-career</link>
			<pubDate>Thu, 27 Aug 2020 08:00:00 -0700</pubDate>
			<dc:creator>968</dc:creator>
			<category>General Infosec</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/cyber-burnout-the-hidden-cost-of-a-security-career</guid>
			<description><![CDATA[Cybercrime and mental health issues are both rampant. This blog will look at how mental health issues can leave organizations more at risk to cybercrime, and how combating cybercrime can affect mental health. ]]></description>
		</item>
		
		<item>
			<title><![CDATA[Revealing REvil Ransomware With DomainTools and Maltego ]]></title>
			<link>https://www.domaintools.com/resources/blog/revealing-revil-ransomware-with-domaintools-and-maltego</link>
			<pubDate>Thu, 20 Aug 2020 08:00:00 -0700</pubDate>
			<dc:creator>949</dc:creator>
			<category>DomainTools Research</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/revealing-revil-ransomware-with-domaintools-and-maltego</guid>
			<description><![CDATA[Learn how to quickly map out a ransomware attack by looking at recent REvil ransomware indicators in DomainTools and Maltego.]]></description>
		</item>
		
		<item>
			<title><![CDATA[Avaddon: The Latest RaaS (Ransomware-as-a-Service) to Jump on the Extortion Bandwagon]]></title>
			<link>https://www.domaintools.com/resources/blog/avaddon-the-latest-raas-to-jump-on-the-extortion-bandwagon</link>
			<pubDate>Thu, 13 Aug 2020 02:00:00 -0700</pubDate>
			<dc:creator>963</dc:creator>
			<category>DomainTools Research</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/avaddon-the-latest-raas-to-jump-on-the-extortion-bandwagon</guid>
			<description><![CDATA[As of August 8th, Avaddon ransomware authors launched an extortion site in an effort to further incentivize victims to pay the ransom. Tarik Saleh dissects this ransomware, analyzes victimology, and provides more details on the extortion site.]]></description>
		</item>
		
		<item>
			<title><![CDATA[Could Automation Kill the Security Analyst?]]></title>
			<link>https://www.domaintools.com/resources/blog/could-automation-kill-the-security-analyst</link>
			<pubDate>Thu, 06 Aug 2020 08:00:00 -0700</pubDate>
			<dc:creator>968</dc:creator>
			<category>General Infosec</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/could-automation-kill-the-security-analyst</guid>
			<description><![CDATA[In a recent study The Ponemon Institute highlights that automation and IT security workers must work hand-in-hand to achieve maximum effectiveness. Learn how to turn automation into a career catalyst by staying ahead of the curve with these five cri]]></description>
		</item>
		
		<item>
			<title><![CDATA[Prioritize and Mitigate Threats More Efficiently with ThreatConnect and DomainTools]]></title>
			<link>https://www.domaintools.com/resources/blog/prioritize-and-mitigate-threats-more-efficiently-threatconnect-domaintools</link>
			<pubDate>Thu, 30 Jul 2020 08:27:00 -0700</pubDate>
			<dc:creator>1357</dc:creator>
			<category>Product Updates</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/prioritize-and-mitigate-threats-more-efficiently-threatconnect-domaintools</guid>
			<description><![CDATA[By combining the data enrichment and automation capabilities, you can prioritize and mitigate threats more efficiently. ThreatConnect and DomainTools, have now officially partnered to deliver the DomainTools Iris Investigate Playbook App. ]]></description>
		</item>
		
		<item>
			<title><![CDATA[Hunting Avaddon Ransomware Infrastructure with Jupyter and DomainTools Iris API]]></title>
			<link>https://www.domaintools.com/resources/blog/hunting-avaddon-ransomware-infrastructure-with-jupyter-and-domaintools-iris</link>
			<pubDate>Thu, 23 Jul 2020 08:00:00 -0700</pubDate>
			<dc:creator>963</dc:creator>
			<category>DomainTools Research</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/hunting-avaddon-ransomware-infrastructure-with-jupyter-and-domaintools-iris</guid>
			<description><![CDATA[Learn how to leverage DomainTools APIs and Jupyter Notebooks to interactively investigate and respond to the Avaddon email spam ransomware then turn your working code into a collaborative tool amongst your peers.]]></description>
		</item>
		
		<item>
			<title><![CDATA[Supercharge Your SecOps with DomainTools App for Elastic ]]></title>
			<link>https://www.domaintools.com/resources/blog/supercharge-your-secops-with-domaintools-app-for-elastic</link>
			<pubDate>Fri, 17 Jul 2020 13:00:00 -0700</pubDate>
			<dc:creator>961</dc:creator>
			<category>Product Updates</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/supercharge-your-secops-with-domaintools-app-for-elastic</guid>
			<description><![CDATA[Learn how DomainTools users of Elastic can supercharge SecOps through our DomainTools App for Elastic]]></description>
		</item>
		
		<item>
			<title><![CDATA[Insights Into the Twitter Bitcoin Scam]]></title>
			<link>https://www.domaintools.com/resources/blog/twitter-bitcoin-scam-investigation</link>
			<pubDate>Fri, 17 Jul 2020 09:04:00 -0700</pubDate>
			<dc:creator>963</dc:creator>
			<category>DomainTools Research</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/twitter-bitcoin-scam-investigation</guid>
			<description><![CDATA[On July 15th, 2020, several verified, high-profile Twitter accounts were being leveraged to send users to a phishing site. In this blog, DomainTools Research Team uncovers insights into the infrastructure, trends, and financials behind these scams.]]></description>
		</item>
		
		<item>
			<title><![CDATA[What is a Red/Blue/Purple Team?]]></title>
			<link>https://www.domaintools.com/resources/blog/what-is-a-red-blue-purple-team</link>
			<pubDate>Thu, 16 Jul 2020 08:00:00 -0700</pubDate>
			<dc:creator>1258</dc:creator>
			<category>General Infosec</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/what-is-a-red-blue-purple-team</guid>
			<description><![CDATA[When working in cybersecurity circles, the terms “Red team” and “Blue team” are bound to make an appearance. In this blog post, we go over the exact definition, origination, and how these terms can help advance your cybersecurity performance.]]></description>
		</item>
		
	</channel>
</rss>