<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:admin="http://webns.net/mvcb/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
	<channel>
		<title>DomainTools</title>
		<atom:link href="https://www.domaintools.com/resources/blog/feed" rel="self" type="application/rss+xml" />
		<link>https://www.domaintools.com/resources/blog</link>
		<description>Innovative, Practical Advice to Improve your Cybersecurity Posture</description>
		<language>en-US</language>
		
		<item>
			<title><![CDATA[Introducing Our First Top Level Defender—Olga Jilani]]></title>
			<link>https://www.domaintools.com/resources/blog/introducing-our-first-top-level-defender-olga-jilani</link>
			<pubDate>Wed, 16 Dec 2020 08:00:00 -0800</pubDate>
			<dc:creator>939</dc:creator>
			<category>General Infosec</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/introducing-our-first-top-level-defender-olga-jilani</guid>
			<description><![CDATA[Congratulations to our Top Level Defender winner, Olga Jilani! From her inspiring story to her daily efforts in making the Internet a safer place and giving back to the infosec community, see how she goes above and beyond to fight cyber badness.]]></description>
		</item>
		
		<item>
			<title><![CDATA[DomainTools Employee Spotlight - Tim Helming]]></title>
			<link>https://www.domaintools.com/resources/blog/domaintools-employee-spotlight-tim-helming</link>
			<pubDate>Tue, 15 Dec 2020 08:00:00 -0800</pubDate>
			<dc:creator>1452</dc:creator>
			<category>Employee Spotlight</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/domaintools-employee-spotlight-tim-helming</guid>
			<description><![CDATA[Discover our Employee Spotlight blog! In this series, we like to celebrate our employees by sharing their stories. This quarter’s feature: DomainTools Security Evangelist, Tim Helming.]]></description>
		</item>
		
		<item>
			<title><![CDATA[Unraveling Network Infrastructure Linked to the SolarWinds Hack]]></title>
			<link>https://www.domaintools.com/resources/blog/unraveling-network-infrastructure-linked-to-the-solarwinds-hack</link>
			<pubDate>Mon, 14 Dec 2020 16:21:00 -0800</pubDate>
			<dc:creator>1416</dc:creator>
			<category>DomainTools Research</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/unraveling-network-infrastructure-linked-to-the-solarwinds-hack</guid>
			<description><![CDATA[The SUNBURST campaign represents a highly complex, operationally savvy, and technically patient effort. Join Joe Slowik for critical takeaways on the network infrastructure of this campaign as well as recommendations for defenders. ]]></description>
		</item>
		
		<item>
			<title><![CDATA[How Targeted Log Collection Strengthens Your Client and Network Defenses]]></title>
			<link>https://www.domaintools.com/resources/blog/how-targeted-log-collection-strengthens-your-client-and-network-defenses</link>
			<pubDate>Thu, 10 Dec 2020 08:00:00 -0800</pubDate>
			<dc:creator>1426</dc:creator>
			<category>General Infosec</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/how-targeted-log-collection-strengthens-your-client-and-network-defenses</guid>
			<description><![CDATA[Make sure to check out part 2 of our 5-part series on log collection. This blog delves into how log sources, the MITRE ATT&CK framework, and metadata can elevate your threat hunting operations.]]></description>
		</item>
		
		<item>
			<title><![CDATA[Identifying Critical Infrastructure Targeting through Network Creation]]></title>
			<link>https://www.domaintools.com/resources/blog/identifying-critical-infrastructure-targeting-through-network-creation</link>
			<pubDate>Tue, 08 Dec 2020 08:00:00 -0800</pubDate>
			<dc:creator>1416</dc:creator>
			<category>DomainTools Research</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/identifying-critical-infrastructure-targeting-through-network-creation</guid>
			<description><![CDATA[In this blog, Senior Security Researcher Joe Slowik illustrates how he uncovered a phishing campaign, which included the Russian nuclear industry, by pivoting off of infrastructure linked to the threat actor known as OilRig. ]]></description>
		</item>
		
		<item>
			<title><![CDATA[An Exciting New Chapter for DomainTools]]></title>
			<link>https://www.domaintools.com/resources/blog/an-exciting-new-chapter-for-domaintools</link>
			<pubDate>Thu, 03 Dec 2020 00:01:00 -0800</pubDate>
			<dc:creator>941</dc:creator>
			<category>Company Updates</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/an-exciting-new-chapter-for-domaintools</guid>
			<description><![CDATA[Our mission has always been to make the internet a safer place for all, and today we are excited to announce our partnership with Battery Ventures, a leading investor in successful high-growth companies, to deliver more quickly on that mission.]]></description>
		</item>
		
		<item>
			<title><![CDATA[Identifying Network Infrastructure Related to a World Health Organization Spoofing Campaign]]></title>
			<link>https://www.domaintools.com/resources/blog/identifying-network-infrastructure-related-to-a-who-spoofing-campaign</link>
			<pubDate>Wed, 02 Dec 2020 05:00:00 -0800</pubDate>
			<dc:creator>1416</dc:creator>
			<category>DomainTools Research</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/identifying-network-infrastructure-related-to-a-who-spoofing-campaign</guid>
			<description><![CDATA[DomainTools researchers identified a domain created to facilitate phishing activity, revealing a focused campaign spoofing the WHO to gather sensitive information from victims.]]></description>
		</item>
		
		<item>
			<title><![CDATA[Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity]]></title>
			<link>https://www.domaintools.com/resources/blog/current-events-to-widespread-campaigns-pivoting-from-samples-to-identify</link>
			<pubDate>Fri, 20 Nov 2020 08:00:00 -0800</pubDate>
			<dc:creator>1416</dc:creator>
			<category>DomainTools Research</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/current-events-to-widespread-campaigns-pivoting-from-samples-to-identify</guid>
			<description><![CDATA[By identifying a phishing document related to recent tensions in the Caucasus, DomainTools researchers were able to detect and analyze a complete campaign stretching from December 2019 through November 2020.]]></description>
		</item>
		
		<item>
			<title><![CDATA[DNS and Domain Logging: A Bird’s Eye View]]></title>
			<link>https://www.domaintools.com/resources/blog/dns-and-domain-logging-a-birds-eye-view</link>
			<pubDate>Thu, 19 Nov 2020 08:00:00 -0800</pubDate>
			<dc:creator>1426</dc:creator>
			<category>General Infosec</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/dns-and-domain-logging-a-birds-eye-view</guid>
			<description><![CDATA[Discover everything you need to know about log collection. In the first blog of this five-part series, we’ll give an industry overview on logging and explore what it means for defenders.]]></description>
		</item>
		
		<item>
			<title><![CDATA[Analyzing Network Infrastructure as Composite Objects]]></title>
			<link>https://www.domaintools.com/resources/blog/analyzing-network-infrastructure-as-composite-objects</link>
			<pubDate>Wed, 18 Nov 2020 08:00:00 -0800</pubDate>
			<dc:creator>1416</dc:creator>
			<category>DomainTools Research</category>
			<guid isPermaLink="false">https://www.domaintools.com/resources/blog/analyzing-network-infrastructure-as-composite-objects</guid>
			<description><![CDATA[In this blog, Senior Security Researcher Joe Slowik uses a recent Ryuk ransomware incident to illustrate a methodology for identifying and tracking adversary operations.]]></description>
		</item>
		
	</channel>
</rss>