<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.domaintools.com/resource-center</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/platform</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/demo</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/feeds</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/company/about</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/partners</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/resources/blog</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/resources/podcasts</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/resources/webinars</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/resources/white-papers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/resources/user-guides</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/resources/case-studies</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/resources/survey-reports</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/company/press</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/contact</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/company/careers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/company/opportunities</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/demo-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/domaintools-demo</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/demo-real-time-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/partnerstack-demo</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/c2e5611abc2cf061c0f86e956a05ce1b-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/resources/5b072237680da94182190149d7fb7953</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/resources/42ec9045e66c5931a53fedebe0e59259</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/demo-landing-page</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/resources/domaintools-reports</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/rss</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/investigations-newsletter-reg</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/newsletter</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/benefits</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/mcp-demo</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/2016-rsa-conference-and-the-domaintools-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/2019-cybersecurity-predictions-from-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/2019-summer-camp-checklist</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/3-reasons-hackers-swipe-right-on-your-profile</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/4-step-guide-to-exploring-attacker-infrastructure-with-web-assets</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/435-million-certificates-and-counting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/5-simple-steps-to-bring-cyber-threat-intelligence-cti-sharing-to-your-organ</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/5-tips-for-threat-hunting-with-farsight-dnsdb</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blog-posts-2017</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blog-posts-of-q1-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blog-posts-of-q2-2019</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blog-posts-of-q2-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blog-posts-of-q2-2022</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blogs-from-q3-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blogs-of-q1-2018</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blogs-of-q1-2019</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blogs-of-q1-2024</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blogs-of-q2-2023</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blogs-of-q2-2024</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blogs-of-q3-2022</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blogs-of-q4-2022</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/7-most-popular-blogs-of-q4-2023</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/8-common-dnsdb-pivots-for-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/8-most-popular-blog-posts-of-2015</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-brief-comparison-of-reverse-image-searching-platforms</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-domain-bloom-in-progress-log4j-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-first-timers-guide-to-hacker-summer-camp</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-history-of-evil-corp-new-leader-named-by-law-enforcement</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-long-time-ago-in-a-zone-file-far-far-away</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-new-shortcut-to-iris-investigate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-new-way-to-pinpoint-dangerous-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-peculiar-entity-what-is-lunax-group</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-quick-guide-to-farsights-grant-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-quick-overview-of-the-top-seven-dns-record-types</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-second-approach-to-automating-detection-of-random-looking-domain-names-neural-networks-deep-learning</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-sticky-situation-part-1-the-pervasive-nature-of-credit-card-skimmers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-sticky-situation-part-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-view-from-europe-gdpr-and-the-future-of-data-privacy</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/a-website-attacked</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/accessing-darknet-telescope-data-via-sie-remote-access-sra</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/all-about-rsa-2022</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/all-i-want-for-christmas-is-a-new-tld</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/all-the-right-moves</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/american-rescue-plan-act-lures-in-the-wild</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/an-early-holiday-gift-iris-enhancements</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/an-exciting-new-chapter-for-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/an-undersea-royal-road-exploring-malicious-documents-and-associated-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/an-update-to-the-domaintools-app-for-splunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/analyzing-dnsdb-volume-over-time-time-series-data-with-r-and-ggplot2-graphics-part-three-of-a-three-part-series</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/analyzing-network-infrastructure-as-composite-objects</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/and-the-winner-is</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/announcing-the-domaintools-domain-discovery-feed</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/announcing-the-domaintools-global-partner-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/apt-easy-as-1-2-3</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/are-you-taking-advantage-of-screenshot-history-site-profiles</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/asn-to-prefixes-to-domain-names-update-to-may-2017-blog-article</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/attack-attribution-looking-back-to-look-forward</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/automated-discovery-of-chenlun-domains-splunk-enterprise-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/automatically-chasing-cnames-in-farsight-dnsdb-scout</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/automatically-going-from-an-autonomous-system-number-asn-to-the-prefixes-it-announces-to-the-domain-names-seen-using-those-ips-another-farsight-dnsdb-api-demo-application-and-whitepaper</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/automating-detection-of-random-looking-algorithmic-domain-names</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/avaddon-the-latest-raas-to-jump-on-the-extortion-bandwagon</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/avoiding-activation-scams-this-football-season</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/balancing-cybersecurity-individual-privacy-new-whois-data-protections-2018</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/batch-mode-and-raw-query-updates-to-dnsdbq</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/beer-necessities-an-introduction-to-danby-the-kegerator</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/beginners-guide-to-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/being-an-internet-packrat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/best-practices-for-data-diaries-in-investigative-journalism-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/bitsquatting-is-alive-and-well</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/black-box-testing-with-the-python-black-box-tool-pbbt</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/black-hat-europe-2018-my-cup-of-tea</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/blazing-a-new-path-for-defenders-at-black-hat-usa</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/boiling-security-down-to-its-essence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/bounty-programs-the-quicker-picker-upper</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/brand-protection-in-iris-investigate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/bringing-new-capabilities-to-the-domaintools-app-for-splunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/brink-and-youll-miss-it</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/build-or-buy-series-how-build-vs-buy-affects-our-hiring-mentality</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/building-a-reputation-system-from-available-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/building-a-tabbed-graphical-interface-in-python3-for-dnsdb</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/building-your-ir-plan-step-by-step</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/bulk-converting-internationalized-domain-names-to-punycode-with-perl-and-netidnencode-for-use-with-dnsdb</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/bulk-parsed-whois-no-api-required</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/buyer-beware-your-vin-is-in-for-a-scare</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/buying-more-nines-worth-of-protection</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/caa-records-an-alternative-to-dane-for-protecting-ssl-tls-certificate-users</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/cache-22</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/campaigning-for-a-more-secure-2020-election</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/can-the-neurodiverse-community-help-to-close-the-cybersecurity-skills-gap</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/carrying-arbitrary-data-payloads-such-as-images-in-nmsg</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/case-study-hunting-campaign-indicators-on-privacy-protected-attack-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/catching-cybercriminals-exploiting-the-pandemic-follow-up</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/caught-in-the-act-a-phishing-expedition</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/celebrating-neurodiversity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/centreon-to-exim-and-back-on-the-trail-of-sandworm</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/change-in-perspective-on-the-utility-of-sunburst-related-network-indicators</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/classic-dnsdb-api-version-1-vs-the-newer-dnsdb-api-version-2-dnsdb-apiv2-what-are-you-using</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/cloud-atlas-navigates-us-into-new-waters</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/cluster-of-domains-targeting-spotify-job-seekers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/conficker-and-a-brief-tutorial-on-working-with-sie-channel-80-sinkhole-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/continuous-eruption-further-analysis-of-the-solarwinds-supply-incident</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/could-automation-kill-the-security-analyst</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/covid-19-has-changed-dns-attacks-heres-how</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/covid-19-phishing-with-a-side-of-cobalt-strike</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/covidlock-mobile-coronavirus-tracking-app-coughs-up-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/covidlock-update-coronavirus-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/creating-a-dnsdb-flexible-search-to-dnsdb-standard-search-pipeline-with-0mq</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/creating-a-heatmap-from-sie-channel-204-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/creating-pandas-dataframes-and-csv-files-from-dnsdb-api-output-using-python3</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/crushing-monolithic-data-results-rock-into-gravel-dnsbq-new-g-volume-across-time-option</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/crypto-phishing-and-credential-stealer-footprint-continues-to-expand</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/current-events-to-widespread-campaigns-pivoting-from-samples-to-identify</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/cyber-burnout-the-hidden-cost-of-a-security-career</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/cyber-monday-deal-or-phishing-scam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/cyber-threat-intelligence-on-the-up-and-up</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/cybersecurity-and-the-boardroom-whats-next-in-the-post-covid-economy</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/cybersecurity-defense-competitions-inspiring-the-next-generation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/cybersquatting-when-the-battle-for-domains-turns-ugly</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dark-web-myths-and-misconceptions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/data-quality-makes-your-security-operations-soar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/data-retention-in-a-post-breach-world</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/def-con-ics-ctf</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/defending-your-brands-against-typosquatters</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/demystifying-spamtraps</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/developing-dns-based-intel-requirements</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/developing-threat-hunting-as-a-practice</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/digital-threat-intelligence-proactively-protects-your-data-from-internet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/discord-malware-and-towinap-the-only-way-is-nuke-and-pave</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/distributed-firewall-configuration-part-1-salt-and-pillars</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/distributed-firewall-configuration-part-2-ferm-configuration-with-salt</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dns-and-domain-logging-a-birds-eye-view</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dns-resolutions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dns-threat-intelligence-for-our-community</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dnsdb-2-0-flexible-search-is-now-available</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dnsdb-api-new-features</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dnsdb-scout-farsights-new-google-chrome-extension-for-dnsdb</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dnsdb-scout-for-firefox-is-now-available</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dnsdb-scout-turns-1</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dnsdb-scout-updates-streamlined-interoperability-with-iris-investigate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dnsdb-standard-searchs-new-plus-sign-wildcard</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domain-and-dns-intelligence-in-fighting-online-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domain-blooms-identifying-domain-name-themes-targeted-by-threat-actors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domain-valuation-how-to-value-a-domain-name</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-blocking-and-tackling-bad-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-dns-shadow-hack-attacked</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-dont-discount-subdomain-signals</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-go-phish-how-the-english-language-helps-threat-actors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-how-dead-is-dead</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-how-domains-are-the-eye-of-the-cyber-hurricane</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-how-to-spot-phishy-domains-on-cyber-monday</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-hunting-grizzlies-with-domaintools-iris</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-i-found-this-creepy-domain-now-what</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-i-love-to-fish</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-looking-at-greenbugs-dns-tunneling-in-ismdoor</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-nothing-is-certain-except</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-preparing-for-black-frauday-friday</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-rent-an-ip-own-a-domain</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-risky-business</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-simple-strategies-to-tackle-phishing-in-your-organization</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-the-art-of-tracking-threat-actors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-101-the-ip-crowd</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-2020-cybersecurity-report-card-some-2020-news-that-doesnt-suck</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-2023-infosec-predictions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-and-digital-archeology-a-look-at-rotajakiro</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-and-farsight-security-join-forces-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-apis-have-more-swagger</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-app-for-demisto-comprehensive-contextual-and-automated-incident</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-app-splunk-updates-2023</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-busts-a-move</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-celebrates-15-years</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-cribl-continuous-enrichment-for-enhanced-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-ariella-robison</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-chad-anderson</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-damon-obrien</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-helen-johnson</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-huy-son</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-ian-campbell</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-karen-kuhar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-michael-klatt</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-susan-prosser</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-tarik-saleh</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-tim-helming</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-timothy-crosley</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-employee-spotlight-tracie-winslow</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-investigations-april-2025-newsletter</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-investigations-february-2025-newsletter</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-investigations-march-2025-newsletter</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-investigations-may-2025-newsletter</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-iris-app-for-anomali</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-iris-for-misp</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-launches-new-flagship-cybersecurity-product</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-membership-evolution</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-palo-alto-networks-best-in-class-dns-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/domaintools-reflects-on-lgbtq-representation-in-infosecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dont-be-schooled-by-brexit-phishing-tactics</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dont-compromise-when-it-comes-to-threat-intel</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dont-get-reeled-in-by-financial-phishing-scams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dt-investigations-security-research-for-the-community</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/dti-inaugural-domain-intelligence-report-summary</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/early-detection-of-russian-disinformation-operations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/early-security-lessons-learned-from-a-worldwide-crisis</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/efficiently-accessing-a-moderately-large-sorted-and-uniquely-keyed-csv-file</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/elevate-your-cyber-defense-with-the-cortex-xsoar-and-domaintools-integration</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/elevate-your-risk-perception-with-early-detection-using-domain-monitors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/empower-your-proxy-logs-with-the-domaintools-app-for-splunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/end-to-end-testing-in-iris-investigate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/enhancing-cybersecurity-incident-response-with-domaintools-a-comprehensive-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/enhancing-dnsdb-to-better-handle-dns-wildcard-names</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/enhancing-dnsdbq-output-with-geolocation-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/enhancing-vulnerability-management-with-cisas-playbook-and-domaintools-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/enhancing-your-investigations-introducing-iris-investigate-1-1</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/evolving-covid-19-challenges-illegitimate-vaccination-cards</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/ex-uno-plures-finding-and-blocking-a-spanning-set-of-ip-addresses-when-starting-from-just-one</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/examining-exchange-exploitation-and-its-lessons-for-defenders</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/explaining-passive-dns-to-family-members</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/exposing-possible-campaigns-with-domaincat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/extrapolating-adversary-intent-through-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsight</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsight-dnsdb-bundles-with-maltego-to-enable-faster-investigations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsight-dnsdb-mapping-privacy-in-the-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsight-dnsdb-now-available-on-malware-information-sharing-platform-misp</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsight-dnsdb-time-fenced-queries-the-new-world-code-is-now-faster-running</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsight-dnsdb-transforms-for-maltego-with-flexible-search-now-available</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsight-returns-to-nicar-for-third-year</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsight-security-debuts-grant-program-for-investigative-reporters</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsight-security-introduces-new-search-capabilities-for-dnsdb</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsights-advanced-exchange-access-internals-understanding-accounting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsights-advanced-exchange-access-part-1-of-3</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsights-advanced-exchange-access-part-2-of-3</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsights-advanced-exchange-access-part-3-of-3</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsights-dnsdb-plugin-for-splunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsights-dnsdb-time-fencing-a-post-attack-time-machine</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsights-network-message-loss-tracking-explained</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsights-network-message-volume-1-introduction-to-nmsg</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsights-network-message-volume-2-introduction-to-nmsgtool</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsights-network-message-volume-5-the-python-programming-api</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsights-real-time-dnsdb-part-one</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/farsights-real-time-dnsdb-part-two</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/fighting-phishing-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/finding-additional-indicators-with-passive-dns-within-domaintools-iris</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/finding-anchordns-c2s-with-iris-investigate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/finding-fast-flux-fully-qualified-domain-names-using-the-sie-dns-changes-channel</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/finding-new-asns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/finding-patterns-that-only-match-registered-domains-and-which-dont-overmatch-against-subdomains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/finding-top-fqdns-per-day-in-dnsdb-export-mtbl-files-part-one-of-a-three-part-series</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/finding-web-proxy-auto-discovery-protocol-wpad-related-security-exposures-using-farsight-securitys-nxdomains-channel</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/five-questions-with-andrew-lewman</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/five-ways-to-give-bad-actors-a-taste-of-their-own-medicine</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/flying-phish</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/fortune-15-technology-enterprise-case-study</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/fraud-in-the-time-of-covid</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/fraudsters-impersonate-ukraines-government-stealing-nfts-crypto</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/free-airline-tickets-the-latest-internationalized-domain-name-based-homograph-scam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/free-covid-19-threat-list-domain-risk-assessments-for-coronavirus-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/from-cybercrime-to-political-repression-shedding-light-on-the-iranian-cyber</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/fun-with-go-method-routing</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/gdpr-is-now-live</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/geolocating-mapping-ip-address-data-from-sie</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/getting-a-running-start-with-the-nvidia-jetson-nano</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/getting-cybersecurity-protection-via-your-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/getting-human-iso8601-datetime-stamps-from-dnsdbq-json-lines-formatted-output</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/getting-more-results-from-dnsdb-using-the-new-o-offset-option</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/getting-the-nist-of-conversations-surrounding-the-first-half-of-2024</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/going-from-a-domain-name-to-ip-address-in-dnsdb-some-pro-tips-to-keep-in-mind</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/going-from-an-ip-address-to-a-fully-qualified-domain-name-fqdn-in-dnsdb</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/going-live-with-splunk-siem-5-and-doing-more-with-splunk-soar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/good-help-is-hard-to-find</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/good-in-the-soc</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/google-protocol-buffer-deserialization-the-hard-way</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/hacktoberfest-2015</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/happy-international-womens-day</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/hardening-encrypted-communications-against-diffie-hellman-precomputation-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/help-the-internet-and-yourself-by-running-a-passive-dns-sensor-node-and-contributing-data-to-the-farsight-security-dns-database-dnsdbtm</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/hey-do-you-guys-have-a-list-of-all-the-domains-in-cctld</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/honoring-juneteenth-at-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-automation-is-reshaping-it-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-domain-intelligence-and-passive-dns-create-a-fuller-domain-profile</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-domaintools-and-phantom-work-in-harmony-so-you-can-soar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-many-parts-or-labels-does-a-domain-name-typically-have</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-security-teams-are-using-threat-intelligence-to-win-fight-against-cybercrime</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-some-people-got-started-in-security-and-anti-abuse-work-anybody-remember-usenet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-targeted-log-collection-strengthens-your-client-and-network-defenses</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-the-failure-of-silicon-valley-bank-inspires-malicious-actors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-to-build-a-human-analysts-hunting-list-with-soar-playbooks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-to-catch-a-cyber-culprit-fingerprint-then-investigate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-to-create-a-security-operations-newsletter</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-to-deploy-your-own-personal-honeypot</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-to-hire-it-security-staff-in-the-age-of-automation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-to-leverage-threat-intelligence-in-incident-response</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-to-make-domaintools-threat-intelligence-actionable-in-a-threat-intelligence-firewall-solution</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-to-not-give-a-scam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-to-stay-out-of-the-cyber-house-of-horrors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-to-translate-value-to-leadership</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-to-uncover-a-massive-campaign-of-counterfeit-related-websites</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/how-we-made-investigations-in-splunk-powerful-effective</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/hunting-avaddon-ransomware-infrastructure-with-jupyter-and-domaintools-iris</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/hunting-down-late-night-security-snacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/hunting-for-rats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/hunting-for-synthetic-substances-using-dnsdb-search</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/hunting-malicious-domains-introducing-domaintools-threat-profile</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/hunting-subdomains-at-def-con-31</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/hunting-the-phish-what-we-can-learn-from-the-docusign-malspam-campaign</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/hurricane-ida-scam-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/identifying-critical-infrastructure-targeting-through-network-creation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/identifying-network-infrastructure-related-to-a-who-spoofing-campaign</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/identifying-possible-spoofed-domains-in-minutes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/illuminating-online-infrastructure-for-counterfeit-goods</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/illuminating-signposts-and-guidelines-for-a-more-secure-internet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/implementing-the-continuous-security-model</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/improved-domaintools-app-for-splunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/in-memoriam-of-ellen-rosintoski</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/in-the-shadow-of-murphys-law-designing-for-failure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/increase-incident-response-speed-and-accuracy-with-farsight-dnsdb-and-demisto-enterprise</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/increase-the-visibility-of-your-linux-dns-servers-with-log-collection</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/increasing-the-overlap-between-it-security-and-domain-expertise</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/indicators-over-cocktails-exporting-indicators-from-iris</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/infosec-is-not-a-prankless-job</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/infosec-to-go-top-security-twitter-accounts-of-2022</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/infosecurity-2018-what-did-we-learn</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/inside-the-murky-world-of-hmrc-phishing-campaigns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/integrating-domaintools-data-sets-in-microsofts-sentinel-siem-product</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/integrating-domaintools-into-the-ai-powered-soc</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/internet-nations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introducing-dnsdb-2-0</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introducing-dnsdb-community-edition-why-internet-history-matters-in-dfir</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introducing-dnsdbfront-for-real-time-investigations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introducing-domaintools-phisheye</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introducing-farsight-workbench-for-threat-hunters</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introducing-iris-investigate-with-collaboration-features</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introducing-nxd</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introducing-our-first-top-level-defender-olga-jilani</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introducing-our-innovative-domain-risk-score</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introducing-the-domaintools-recipe-book-project</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introducing-the-new-iris-investigate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introduction-to-dns-changes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introduction-to-farsights-nod-rpz</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introduction-to-ipfs</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introduction-to-reputation-systems</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/introduction-to-sie-channel-115-ddos-events</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/investigate-all-the-things-in-slack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/investigating-the-u-s-census-domain-using-passive-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/investing-in-cybersecuritys-future-the-uk-cyber-9-12-strategy-challenge</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/ip-hijacking-part-1</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/ip-hijacking-part-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/ips-address-ranges-and-cidr-block-queries-in-dnsdb-api</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/ipv6-deployment-and-finding-ipv6-needles-in-internet-haystacks-passive-dns-ipv6-address-discovery</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/ipv6-deployment-over-time-as-seen-through-farsight-security-incs-passive-dns-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/ipv6-you-may-already-be-using-it</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/iris-customization-enhancements</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/iris-detect-a-new-way-to-discover-and-monitor-hostile-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/iris-investigate-features-blooming-like-spring-flowers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/iris-investigate-now-with-more-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/iris-investigate-summer-2019-featuresget-em-while-its-still-hot</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/iris-investigations-at-a-glance-how-to-pivot-on-domain-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/iris-spring-beyond-whois-release-more-efficiency-more-pivots-more-answers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/is-cyberinsurance-right-for-your-organization</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/its-a-big-world-of-data-out-there</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/its-a-python-wrap</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/its-a-small-cluster-after-all</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/ive-found-some-bad-domains-now-what</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/json-serialization-support-in-nmsg</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/keep-your-ir-on-the-ball</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/know-before-you-go-questionable-pokemon-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/krebs-on-domaintools-a-closer-look-at-the-terracotta-vpn-research</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/laymans-guide-to-online-privacy-and-anonymity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/leaping-down-a-rabbit-hole-of-fraud-and-misdirection</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/less-phishing-more-cat-pictures</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/lessons-learned-from-sunburst-for-threat-hunters</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/leveraging-domain-intelligence-for-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/leveraging-risk-scoring-for-threat-hunting-domaintools-risk-score</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/limiting-dnsdb-results-dnsdbq-little-ell-vs-big-ell</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/looking-back-to-look-forward-the-anthem-breach</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/looking-to-2016-a-note-from-our-ceo</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/magical-thinking-in-internet-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/making-programmatic-dnsdb-queries-with-libcurl</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/making-the-case-for-determining-risk-based-on-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/malformed-internationalized-domain-name-idn-leads-to-discovery-of-vulnerability-in-idn-libraries</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/malware-information-sharing-platform-misp-now-offering-farsight-dnsdb-flexible-search-capabilities</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/managing-remote-teams-in-interesting-times</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/marriott-data-breach-why-news-reports-act-as-wake-up-call-for-cybercriminals</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/merry-phishmas-beware-us-postal-service-phishing-during-the-holidays</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/mirror-mirror-on-the-wall-whos-the-fairest-website-of-them-all</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/monday-morning-quarterbacking-super-bowl-50-infosec-edition</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/more-than-one-phish-in-the-sea</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/movies-and-malicious-behavior-ten-warning-signs-to-look-out-for</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/moving-target-defense-and-dns-fast-flux</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/music-and-malicious-behavior-six-warnings-signs-to-look-out-for</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/national-cybersecurity-awareness-month-2020-and-the-domain-name-system-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/navigating-cybersecurity-rough-seas-choosing-objective-observations-vs-narrative-fallacies</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/need-a-new-pc-buy-one-thats-prebuilt-rather-than-building-one-yourself</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/network-message-volume-3-headers-and-encoding</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/network-traffic-analysis-and-adversary-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/network-traffic-analysis-and-adversary-infrastructure-part-ii</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-cof2misp-import-module-for-misp-enables-threat-hunters-to-improve-cybersecurity-investigations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-developments-usps-smishing-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-dnsdb-v-summarize-option-sometimes-less-is-more</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-dnsdbq-options-asn-tagging-and-new-output-transforms-added</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-draft-rule-on-ransomware-payments-and-cyber-incident-reporting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-farsight-security-research-dns-network-traffic-volumes-during-the-2020-pandemic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-farsight-white-paper-available-for-download-building-a-demo-gui-front-end-for-dnsdb-api-in-scala</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-improvements-to-dnsdbq</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-look-same-commitment-to-a-safe-secure-and-open-internet-for-everyone</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-major-version-of-sie-remote-access-sra</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-phone-who-dat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-report-a-decade-of-passive-dns-a-snapshot-of-top-level-domain-traffic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-report-available-aggregate-count-data-for-all-internet-ipv4-addresses-as-seen-in-dnsdb-a-records</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-report-dns-network-traffic-volumes-during-the-pandemic-april-2020-march-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-report-secure-virtual-private-server-under-debian-11</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-ui-names-for-farsight-dnsdb-transforms-for-maltego</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-whitepaper-working-with-the-sie-batch-api-a-command-line-client-in-ruby-perl-python-and-c</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-year-new-threats-the-industrys-top-cybersecurity-predictions-for-2018</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/new-years-resolutions-it-style</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/newly-observed-hostnames</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/newly-registered-domains-vs-newly-observed-domains-vs-newly-active-domains-vs-newly-observed-hostnames-vs-dns-changes-what-does-new-mean</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/nmsg-and-json-encoding</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/no-blocking-no-issue-the-curious-ecosystem-of-financial-advisor-impersonation-scams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/no-one-expects-the-pineapple-affix</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/nod-and-greylisting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/non-routable-private-address-space-that-appears-in-dnsdb-results</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/non-u-s-universities-with-edu-domain-names-theyre-more-common-than-you-might-think</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/not-the-boots-i-was-looking-for</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/nothing-bot-net</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/nothing-compares-to-cpu</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/nothing-is-certain-but-death-and-taxes-and-phishing-scams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/nowhere-near-extinction-mastodon-one-year-later</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/one-billion-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/opt-what</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/optimizing-incident-response-with-the-domaintools-app-for-ibm-qradar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/optimizing-reputation-system-input-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/organizational-announcement</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/our-new-scrolling-domain-widget</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/out-here-playing-games</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/parallelizing-your-farsight-dnsdb-queries</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/parasitic-computing-implemented</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/part-2-hacker-movies-and-cybersecurity-concerns-go-mainstream</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/part-2-tracking-lummac2-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/passive-dns-and-sie-file-formats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/paul-security-weekly-617-on-domaintools-iris</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/pauls-security-weekly-598-on-domaintools-iris-investigate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/performing-regex-searches-against-dnsdb-mtbl-files</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/pick-a-side-pick-a-site</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/plain-phishing-still-outpacing-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/poison-pivots</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/post-gdpr-security-investigations-part-1</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/post-gdpr-security-investigations-part-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/post-gdpr-security-investigations-part-3</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/post-quantum-cryptography-pqc-you-may-already-be-using-it</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/pranksgiving</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/prioritize-and-mitigate-threats-more-efficiently-threatconnect-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/proactive-defense-with-domaintools-real-time-feeds</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/processing-passive-dns-with-the-nmsg-c-api</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/processing-passive-dns-with-the-nmsg-c-api-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/profiling-malicious-domains-in-the-domaintools-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/protecting-against-supply-chain-attacks-by-profiling-suppliers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/purpose-built-criminal-proxy-services-and-the-malicious-activity-they-enable</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/putting-the-tee-in-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/ramnit-jim-im-a-threat-hunter-not-a-doctor</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/rate-limiting-with-redis</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/raw-hex-rdata-queries-an-obscure-but-potentially-quite-useful-bit-of-dnsdb-functionality</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/rdap-and-bgp-in-investigative-journalism</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/rdap-frequently-asked-questions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/real-time-collaboration-real-time-investigation-with-farsight-dnsdb-and-polarity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/record-typenull-records-in-dnsdb-mtbl-files</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/red-canary-announces-farsight-security-as-inaugural-technology-partner</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/redefining-critical-infrastructure-for-the-age-of-disinformation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/reduce-your-attack-surface-while-traveling</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/reducing-risk-in-a-fast-changing-world</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/reflections-2024-verizon-dbir</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/reflections-2025-verizon-dbir</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/reflections-on-the-first-conference-in-san-juan-puerto-rico</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/rejecting-spam-and-unwanted-email-with-nod-and-rpz</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/remote-profiling-of-go-programs</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/removing-the-mask-how-neurodiversity-strengthens-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/reopen-domains-shut-the-front-dorr</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/researchers-and-journalists-searching-for-common-ground</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/retail-targeted-campaigns-domain-fraud-brand-impersonation-and-ponzi-schemes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/return-to-sender-a-brief-analysis-of-a-us-postal-service-smishing-campaign</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/revealing-revil-ransomware-with-domaintools-and-maltego</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/revving-up-rsa-conference-2020-with-farsights-real-time-innovations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/risky-business-on-cyber-monday</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/rrset-and-rdata-demystified</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/rsa-conference-2019-why-dns-based-attacks-remain-top-security-concern-for-cisos</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/running-bulk-queries-in-dnsdb-for-a-file-of-ip-addresses</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/running-dnsdb-query-py-under-termux-on-android</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/scripting-attack-on-domaintools-accounts</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/searching-for-the-truth-in-2020-and-beyond-using-farsight-passive-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/seeing-red</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/self-hosted-exchange-with-a-walled-garden</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/shortening-dwell-time-using-farsight-passive-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/sie-batch-api-a-libcurl-example-in-c-sie-get</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/smarter-json-configs-in-go</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/so-whats-the-big-deal-about-new-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/so-youre-going-to-rsa-conference-2024</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/solarwinds-aftermath-threat-hunting-survey-yields-mixed-news</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/sometimes-disinformation-campaigns-are-all-bloom-and-gloom</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/spamtraps-creating-and-seeding</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/spamtraps-keeping-it-confidential</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/splunk-govsummit-recap-navigating-the-world-of-ai-and-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/spm55-ascending-the-ranks-of-indonesian-phishing-as-a-service-offerings</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/spoofing-banks-is-a-balancing-act</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/spotting-a-dns-denial-of-service-reflection-attack-in-sie-darkspace-telescope-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/stand-and-report-iris-investigate-collaboration-features-roll-on</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/start-your-engines-from-fal-con-to-the-fast-lane</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/stop-crypto-kleptos-in-their-tracks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/stop-that-phish</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/streamlining-adversary-infrastructure-hunting-with-soar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/strengthen-your-defense-with-windows-dns-logging</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/strengthen-your-investigations-resolve-with-pdns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/summer-vacation-checklist-sandals-sunglasses-and-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/supercharge-your-secops-with-domaintools-app-for-elastic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/supercharge-your-threat-investigations-with-irisql</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/survey-report-the-value-of-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/surviving-rsa-as-a-first-timer-a-cautionary-tale-kinda</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/systematically-collecting-the-right-sort-of-data-about-cyber-security-incidents</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/taking-stock-of-cybersecurity-images</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/tax-scammers-gone-phishing-this-tax-season</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/teach-your-parents-well-smartphone-security-and-aging-parents</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/teaching-infosec-in-west-africa-a-lesson-in-the-value-of-diversity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-2019-threat-hunting-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-anti-phishing-working-group-apwgs-global-phishing-survey-farsights-take-on-a-terrific-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-awe-and-horror-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-benefit-of-code-without-actually-writing-it</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-burden-of-spoof-the-ongoing-investigation-of-walmartcareers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-continuous-conundrum-of-cloud-atlas</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-cyber-avengers-assemble-partnership-in-the-battle-to-make-the-internet-a-safer-place</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-devils-in-the-details-sunburst-attribution</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-domain-name-and-its-role-in-cyber-forensics</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-domaintools-report-2015-special-edition</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-domaintools-report-fall-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-domaintools-report-spring-2017</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-domaintools-report-spring-2023</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-domaintools-report-spring-2024</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-domaintools-spring-2022-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-economic-benefits-of-using-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-glory-days</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-impact-of-automation-on-it-security-staffing</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-importance-of-scale-a-critical-dimension-to-keep-in-mind-when-benchmarking-passive-dns-options</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-magic-of-srv-records</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-most-prolific-ransomware-families-2023-edition</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-most-prolific-ransomware-families-a-defenders-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-move-to-mastodon-tips-and-tricks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-new-hotness-at-domaintools-introducing-domain-hotlist</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-numbers-behind-whois-privacy</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-only-thing-thats-constant-is-change-the-dns-changes-channel-sie-channel-214</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-power-of-dns-osint-in-detecting-supply-chain-compromises</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-power-of-why</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-promised-lan</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-registration-data-access-program-rdap-whois-and-you</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-resurgence-of-the-manipulaters-team-breaking-heartsenders</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-sonny-cher-of-digital-intelligence-gathering</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-state-of-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-threat-hunting-mixtape</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-use-cases-and-benefits-of-svcb-and-https-dns-record-types</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/the-value-of-a-brand-domain-name-priceless</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/these-days-some-of-the-bad-guys-are-even-spoofing-fbi-related-domain-names</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/think-like-a-phish</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/this-article-was-written-by-a-machine</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/this-is-the-end-of-the-beginning</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/threat-defense-with-domaintools-integration-with-crowdstrike-falcon</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/threat-hunting-using-farsight-historical-passive-dns-observations-via-the-malware-information-sharing-platform-misp</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/threat-intelligence-and-the-dikw-pyramid</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/threat-intelligence-sharing-in-action-cyber-community-covid-19-response</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/threat-monitoring-newly-created-ukraine-related-domain-names</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/thwarting-state-sponsored-threats-four-ways-to-give-bad-actors-more-bad-days</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/timeless-gifts-for-the-ciso-in-your-life</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/timing-is-everything</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/tis-the-season-to-counterfeit</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/tools-to-quickly-extract-indicators-of-compromise</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/top-4-cyber-industry-scare-tactics</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/top-6-rsa-parties-of-2016</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/top-security-twitter-accounts</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/touched-by-an-idn-farsight-security-shines-a-light-on-the-internets-oft-ignored-and-undetected-security-problem</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/tracelabs-missing-persons-ctf-i-know-where-you-were-last-summer</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/tracking-a-trickbot-related-ransomware-incident</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/tracking-lummac2-infrastructure-with-cats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/tracking-the-dns-stars-the-dns-observatory</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/travel-advisory-dont-let-these-scams-steal-your-summer-fun</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/turn-the-tide-on-phishing-and-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/twitter-bitcoin-scam-investigation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/two-dns-dudes-with-a-tude-dissect-the-namewreck-vulnerability-in-episode-one-of-new-streaming-series</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/uncovering-octo2-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/understanding-sie-channel-access</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/unraveling-a-telecom-billing-fraud-campaign-targeting-uk-users</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/unraveling-network-infrastructure-linked-to-the-solarwinds-hack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/up-to-your-gills-in-phishing-attacks-this-research-may-help</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/update-financial-advisor-impersonation-ring-targets-finra</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/use-of-passive-dns-in-multidisciplinary-teams-collaboration</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/useful-sources-of-domain-and-dns-logging</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-0mq-to-plumb-a-simple-intermediate-layer-for-a-dnsdb-client-server-application</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-axamd-to-read-observations-from-nod-sie-ch212-newly-observed-domains-with-python3</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-dns-search-to-uncover-phishing-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-dnsdb-flexible-search-to-find-matching-rdata-in-txt-records</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-dnsdb-with-openssl-s-client-to-scan-a-list-of-hosts-for-expired-ssl-tls-certificates</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-domaintools-and-microsoft-security-copilot-to-enhance-domain-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-domaintools-iris-to-enhance-classic-whois-and-rdap</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-domaintools-threat-profile-to-identify-risky-tlds</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-farsights-dnsdbq-command-line-dnsdb-tool-in-a-microsoft-windows-environment-the-windows-subsystem-for-linux-option</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-infrastructure-analysis-to-get-ahead-of-attacks-in-cyber-defense-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-infrastructure-analysis-to-get-ahead-of-attacks-in-cyber-defense-3</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-infrastructure-analysis-to-get-ahead-of-attacks-part-1</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-iris-investigate-pivot-engine-to-collect-bulk-screenshots</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-passive-dns-to-avoid-collateral-damage-during-takedowns-and-seizures</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/using-the-sie-batch-api-to-find-matching-names-in-newly-observed-domains-nod</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/valuable-datasets-to-analyze-network-infrastructure-part-1</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/valuable-datasets-to-analyze-network-infrastructure-part-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/valuable-datasets-to-analyze-network-infrastructure-part-3</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/vegas-or-bust-a-first-timers-review-of-black-hat-and-defcon</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/visibility-monitoring-and-critical-infrastructure-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/visualizing-domaintools-data-with-maltego</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/visualizing-sie-channel-204-rdata</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/visualizing-the-hard-to-visualize-dns-and-ssl-tls-cert-existence-over-time-using-r-graphics</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/visualizing-the-incidence-of-ipv4-addresses-in-farsights-dnsdb</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/volume-over-time-data-from-dnsdb-export-mtbl-files-part-two-of-three-part-series</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/wannacry-the-exception-that-proves-the-rule</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/warzone-1-0-rat-analysis-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/warzone-1-0-rat-analysis-report-part-ii</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/watch-your-back-improve-your-security-posture-and-reduce-the-risk-of-attack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/we-dont-make-light-of-security-introducing-iris-investigate-dark-mode</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/we-know-how-to-prevent-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/we-need-an-american-girl-who-bolsters-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/we-need-more-roads-into-infosec</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/webinar-making-dns-your-greatest-ally-in-active-defense</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/welcome-mike-convertino</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-besides-nxdomains-do-we-see-on-farsight-securitys-dns-errors-channel</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-covid19-can-tell-us-about-the-future-of-disinformation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-did-we-learn-from-the-2023-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-does-whois-data-have-to-do-with-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-a-bailiwick</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-a-cyber-incident-response-plan</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-a-red-blue-purple-team</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-a-tip</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-an-online-fraud-investigation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-brand-protection</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-cybersecurity-forensics</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-globbing</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-phishing</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-siem</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-soar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-is-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/what-to-do-about-inaccurate-whois-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/whats-a-regular-expression</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/whats-a-uuid</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/whats-in-a-domain-name</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/whats-new-in-the-world-of-cyber-rsa-2024-recap</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/whats-new-with-iris-investigate-and-enrich-fall-2023</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/whats-rdap-and-where-is-whois</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/whats-sie-batch-why-might-i-be-interested-in-it</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/when-it-comes-to-indicators-there-is-no-reason-to-compromise</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/when-work-works-award</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/which-dns-records-are-best-for-easy-listening</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/which-nation-states-are-trying-to-hack-covid-vaccine-development</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/whois-and-passive-dns-data-together-again-for-the-first-time</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/whois-data-more-important-than-ever</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/whos-that-knocking-at-the-front-door</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/why-do-incident-responders-and-other-investigators-focus-on-particular-dns-record-types</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/why-does-whois-matter-for-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/why-rdap-is-the-next-big-step-in-domain-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/why-your-protective-dns-needs-real-time-data-the-domaintools-advantage</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/winter-vivern-a-look-at-re-crafted-government-maldocs</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/year-by-year-tld-volumetric-data-covering-a-decade</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/you-must-pay-the-toll-troll</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/youre-gonna-need-a-bigger-pane-of-glass</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/blog/zone-walking-zone-enumeration-via-dnssec-nsec-records</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/policies/california-privacy-notice</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/policies/do-not-sell</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/policies/enterprise-subscription-agreement</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/policies/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/policies/service-level-agreement</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/policies/standard-contractual-clauses-customer-employees-agents</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/policies/standard-contractual-clauses-customer-queries</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/policies/standard-contractual-clauses-services-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/policies/terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/aaron-gee-clough</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/andrew-bukta</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/andy-horwitz</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/andy-vance</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/anthony-johnson</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/anthony-viera</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/austin-northcutt</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/barry-rellis</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/ben-april</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/bernard-brode</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/brendan-oconnell</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/brian-de-lemos</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/chad-anderson</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/chris-kissel</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/chris-mikkelson</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/collin-anderson</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/corin-imai</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/cti-grapevine</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/dan-fernandez</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/dan-nunes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/dan-white</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/daniel-schwalbe</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/david-monahan</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/domaintools-investigations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/domaintools-research</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/eric-ziegast</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/farsight-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/grant-cole</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/ian-campbell</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/jeff-quist</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/jeremy-reed</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/jill-boon</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/joe-slowik</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/joe-st-sauver</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/john-cardani-trollinger</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/john-turbo-conwell</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/julia-ibinson</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/kacie-houser</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/kali-fencl</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/kelly-molloy</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/kelsey-labelle</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/kevin-libby</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/kirsten-duke-cpa-cgma</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/larry-ponemon</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/malachi-walker</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/matthew-haynes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/mike-mccarthy</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/nadav-shai-kanon</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/oliver-tonge</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/paul-asadoorian</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/paul-vixie</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/peter-andrious</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/rajat-gambhir</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/rob-fawcett</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/robert-duran</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/sean-mcnee</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/stephanie-wisdom</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/steve-behm</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/steven-hallman</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/susan-prosser</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/taylor-wilkes-pierce</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/tim-chen</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/tim-durant</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/tim-helming</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/travis-hall</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/tyler-wood</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/veronica-stonis</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/vinaya-sheshadri</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/authors/wesley-agena</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/anomali</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/cortex-xsiam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/cortex-xsoar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/crowdstrike</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/eclecticiq</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/elastic-elk-stack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/exabeam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/google-soar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/ibm-qradar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/ibm-resilient</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/maltego</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/microsoft-sentinel</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/misp</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/polarity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/rapid7</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/recorded-future</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/servicenow</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/splunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/splunk-soar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/thehive-and-cortex</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/threatconnect</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/threatq</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/tines</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/integrations/torq</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/10-who-am-i-thats-one-secret-ill-never-tell</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/100-the-big-one-pundred</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/101-ransomware-and-malware-and-justice-oh-my</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/102-tales-of-justice-cash-and-shrootlessness</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/103-malware-and-tear</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/104-the-old-bait-and-glitch</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/105-the-call-is-coming-from-inside-the-house</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/106-log4shell-shock</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/107-a-fraudsters-scam-dunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/108-malware-is-not-my-cup-of-iot</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/109-the-big-revil</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/11-turtle-y-awesome</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/110-a-sad-state-of-malwares</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/111-neither-hide-nor-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/112-a-fluid-situation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/113-threat-actors-ddos-a-line</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/114-domains-of-our-lives</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/115-a-ransomware-for-the-dramatic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/116-a-breach-im-afraid-sso</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/117-fire-in-the-wall</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/118-dont-let-ransomware-you-down</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/119-a-steaming-cup-of-malicious-javascript</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/12-the-weekly-shatter</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/120-reading-the-iot-leaves</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/121-ir-you-afraid-of-the-dark-web</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/122-inside-the-threat-actors-studio</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/123-ace-in-the-hole</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/124-patch-me-if-you-can</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/125-nobody-makes-me-hertzbleed-my-own-blood</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/126-give-em-the-old-raasledazzle</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/127-like-shooting-phish-in-a-barrel</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/128-black-hat-trick</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/129-sms-verification-code-red</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/13-the-hurt-locker</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/130-bigger-phish-to-fry</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/131-xmring-a-ding-ding</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/132-here-kitty-kitty</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/133-a-shot-in-the-dark-web</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/134-osintillating-conversation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/135-raspberry-pi-in-the-sky</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/136-ttps-i-love-you</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/137-vishing-persons-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/138-into-the-w4sps-nest</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/139-somethings-polyglot-to-give</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/14-rip-grumpy-cat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/140-party-of-five</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/141-scam-a-lama-ding-dong</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/142-pheast-of-the-seven-phishes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/143-the-best-of-2022</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/144-lastpass-on-the-left</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/145-me-myself-and-api</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/146-i-am-extortionary-if-you-ever-get-to-know-me</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/147-doubleback-in-black</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/148-what-not-to-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/149-you-data-broker-my-heart</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/15-two-truths-and-a-lie</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/150-thrifty-nifty-never-shifty-part-i</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/150-thrifty-nifty-never-shifty-part-ii</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/151-epic-bail-the-collapse-of-silicon-valley-bank-and-its-impact-on-infosec</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/152-good-will-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/153-its-pillar-time</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/154-not-your-neurotypical-episode</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/155-sunburst-your-bubble</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/156-romancing-the-scam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/157-they-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/158-zero-days-of-our-lives</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/159-do-or-do-not-there-is-no-triangulation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/16-how-to-drain-your-dragons</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/160-legends-of-the-hidden-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/161-the-early-bird-gets-the-wormgpt</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/162-animal-bot-farm</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/163-phishermans-wharf</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/164-in-da-nightclub-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/165-gorillas-in-the-nist</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/166-im-w3ll-aware-of-bec-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/167-ir-you-feeling-lucky</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/168-same-origin-of-the-species</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/169-ddosawsons-creek</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/17-a-root-awakening</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/170-moveit-on-up</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/171-the-fancy-bear-necessities</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/172-solarwinds-of-change</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/173-how-to-eat-fried-sandworms</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/174-pick-your-dns-cache-poison</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/175-bazarcall-of-the-wild</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/176-a-tale-of-oauth2-cities</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/177-just-around-the-coldriver-bend</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/19-the-regin-of-doom</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/2-african-or-european-exes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/20-not-just-phishing-for-the-halibut</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/2024-infosec-predictions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/2025-cybersecurity-predictions-ai-ransomware-and-quantum-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/21-introducing-the-new-security-moat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/22-lifes-a-breach</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/23-youll-always-be-mybb</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/24-cache-me-if-you-can</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/25-exploits-worm-my-heart</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/26-this-is-why-we-cant-have-nice-things</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/27-security-shenanigans</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/28-not-so-trivial-pursuit</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/29-keep-it-on-the-dl-l</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/3-fancy-bear-awakens-from-its-winter-slumber</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/30-trick-or-threat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/31-architects-of-spamnation-with-graham-cluley</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/32-the-waterbear-er-of-bad-news</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/33-life-is-a-malware-playground</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/34-only-the-good-bits-byte</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/35-hanging-with-the-chads</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/36-the-security-soundtrack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/37-russian-to-confusion-with-irfan-asrar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/38-malware-is-from-mars-implants-are-from-venus</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/39-an-old-fashioned-rom-com</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/4-you-down-with-apt-yeah-you-know-me</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/40-prime-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/41-psa-the-more-you-trickmo</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/42-not-just-phishing-for-the-halibut-with-allan-liska</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/43-left-to-our-own-devices</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/44-shake-spear-phishing</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/45-the-dorrs-tell-all-the-people</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/46-there-are-no-bugs-just-happy-little-exploits</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/47-u2-have-to-deal-with-raas</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/48-a-riddle-apt-in-an-enigma</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/49-pretty-in-ink</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/50-thats-the-way-the-hoodie-crumbles</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/51-the-sith-cyber-robe</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/52-a-picture-is-worth-a-thousand-bytes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/53-waf-out-loud</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/54-watch-out-for-script-kitties</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/55-why-so-cirrus</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/56-skimming-with-the-phishes-with-ryan-kovar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/57-a-ransomware-to-remember</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/58-worse-for-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/59-tesla-ransomware-safe</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/6-the-ides-of-arch</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/60-go-go-inspector-element</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/61-kirkland-signature</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/62-iot-has-come-home-to-roast</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/63-apt-comes-up-for-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/64-why-bugs-produce-an-apple-of-discord</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/65-not-just-a-ryuk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/66-whiskey-business</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/67-a-pain-in-the-raas</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/68-lets-doc-turkey</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/69-its-not-all-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/7-fending-off-canadian-tuxedos</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/70-gone-with-the-solarwind</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/71-throwing-caution-to-the-solarwinds</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/72-europols-their-own-weight</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/73-sunburst-on-the-scene</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/74-an-empty-emotet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/75-russian-roulette</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/76-hardware-software-theres-a-hack-for-everything</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/77-baby-cams-and-crimeware-scams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/78-license-to-shill</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/79-speak-of-the-revil</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/8-too-big-for-our-breaches</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/80-plenty-of-phish-in-the-sea</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/81-its-not-all-zoom-and-gloom</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/82-solarwinds-and-losses</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/83-back-in-hack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/84-take-a-payload-off</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/85-vulnerabilities-are-an-endless-cycle</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/86-a-pain-in-the-gas</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/87-a-sad-state-of-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/88-the-bearer-of-bad-news</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/89-the-game-is-up</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/9-feeling-lucky88755</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/90-a-whole-host-of-problems</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/91-when-security-hits-a-rough-patch</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/92-the-game-is-afoot</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/93-in-the-zone</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/94-spooler-heads-prevail</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/95-bec-you-later</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/96-a-not-so-idle-botnet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/97-the-skies-are-all-kinds-of-blue</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/98-spill-the-iot</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/99-time-to-break-a-threat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/a-year-in-covid-cybercrime</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/achieving-cyber-resilience-through-vulnerability-management-and-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/actionable-threat-intelligence-with-jackie-abrams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/ais-role-in-cybersecurity-from-edr-evolution-to-generative-ai-threats-and-supply</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/apt-41s-vpn-exploits-amp-the-great-firewalls-leaky-secrets</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/attribution-in-the-age-of-ai-cloud-threats-real-attacks-and-zero-knowledge-adversaries</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/beyond-the-perimeter-how-attackers-use-domains-phishing-amp-ai-and-how-to-fight-back</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-book-club-1</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-book-club-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-book-club-3</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-book-club-with-dmitri-alperovitch</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---181-say-my-cname-say-my-cname</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---182-call-to-arms</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---183-blackcats-out-of-the-bag</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---184-saflok-it-down</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---185-beceize-the-day</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---186-while-my-vidar-gently-weeps</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---187-harriet-the-spyware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---188-vish-upon-a-star</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---189-malware-the-wild-things-are</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---191-hacker-summer-camp-retrospective</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---192-tld-fense</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---kymberlee-price</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---voices-from-infosec-jake-bernardes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast---voices-from-infosec-tanya-janca</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast-178-volt-typhoon-lagoon-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast-179-scamily-matters</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast-180-i-sooner-or-later</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-badness-cybersecurity-podcast-190-the-weak-security-default-in-our-stars</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/breaking-down-retail-targeted-campaigns-domain-fraud-copycats-and-ponzi-schemes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/building-a-hacker-conference-from-scratch-the-wild-origins-of-shmoocon</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/building-secure-campaigns-and-better-humans-a-conversation-with-mick-baccio</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/cracking-the-code-api-security-mobile-myths-and-real-world-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/cybersecurity-tales-espionage-ransomware-and-the-stories-behind-the-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/dev---featured-post</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/dfir-foundations-real-world-lessons-in-containment-eradication-and-recovery</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/dfirside-chat-lessons-from-the-frontlines-of-incident-response</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/dns-errors-and-malware-builders-turning-on-attackers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/dns-gone-rogue-amp-darpas-cyber-puzzle-lessons-in-security-innovation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/from-newsroom-to-threat-room-audra-streetmans-journey-into-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/from-valleyrat-to-silver-fox-how-graph-based-threat-intel-is-changing-the-game</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/from-wingdings-to-warfare-inside-the-wildest-cybersecurity-stories</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/hacked-chats-amp-telecom-takedowns-black-basta-amp-salt-typhoon</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/hacking-the-stage-john-donovan-on-rsac-bsides-sf-and-the-human-side-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/healthcare-cybersecurity-protecting-patients-in-2024-ken-zalevsky</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/how-russian-disinformation-campaigns-exploit-domain-registrars-and-ai</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/industrial-cybersecurity-explained-with-lesley-carhart</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/inside-morphing-meerkat-and-proton66-how-cybercrime-is-getting-easier</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/inside-ransomwares-supply-chain-attribution-rebrands-and-affiliate-betrayal</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/inside-the-mind-of-the-gibson-ethics-activism-and-the-evolution-of-hacking</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/it-takes-a-village-to-secure-ai</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/leveling-up-mental-health-tackling-gaming-toxicity-and-cybersecurity-burnout</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/locate-x-unleashed-amp-apt29s-latest-gambit-the-battle-for-digital-privacy-option</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/playing-defense-jason-haddix-on-red-team-tactics-ciso-challenges-and-the-battle-for-gaming-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/rogue-hackers-and-the-internet-archive-breach-31-million-accounts-exposed</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/s3-takeovers-deepseek-deceptions-amp-the-clouds-dirty-laundry</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/special-report-father-phishmas-give-us-the-money</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/special-report-quadrant-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/special-report-quadrant-security-re-release</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/special-report-ransomware-and-mortgage-brokers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/special-report-two-seans-a-tim-and-a-pig-butchering-ring</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/spring-cleaning-your-digital-life-apt-threats-third-party-breaches-and-chat-risks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/summer-camp-2019-mini-series</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/tanya-janca-on-secure-coding-appsec-and-breaking-barriers-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/the-art-of-the-possible-mini-series</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/the-best-of-2023</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/the-future-of-endpoint-security-ai-edr-and-soc-evolution</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/the-human-element-mini-series</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/the-machine-kernel-of-truth</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/the-multi-cloud-mess-why-complexity-is-killing-visibility</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/the-rise-of-holiday-scams-and-state-sponsored-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/the-stronger-together-mini-series</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/top-cyber-moments-of-2024-hoodies-goodies-and-hilarious-puns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec---peter-lowe</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec---tony-robinson</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-allan-liska-returns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-adam-levin-and-beau-friedlander</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-caitlin-kiska</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-harshil-parikh</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-jeff-horne</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-jennifer-leggio</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-kat-sweet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-liz</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-niamh-muldoon</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-nullcookies</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-olga-jilani</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-paul-vixie</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-regina-elwelland-alyssa-rahman</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-tracy-maleeff</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/voices-from-infosec-with-zoe-rose</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/why-dns-is-still-the-biggest-blind-spot-in-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/podcasts/zero-trust-secure-coding-amp-developer-incentives-tanya-janca-on-appsecs-biggest-challenges</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/2020-forecast-cloudy-with-a-chance-of-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/2020-sans-cyber-threat-intelligence-cti-survey-panel-discussion</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/2021-sans-cyber-threat-intelligence-cti-survey-panel-discussion</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/2021-weve-made-a-hash-of-it</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/a-domaintools-and-maltego-webinar-examining-the-infrastructure-of-the-disneyland-malware-team</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/a-sans-2021-survey-threat-hunting-in-uncertain-times-panel-discussion</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/a-whole-new-world-using-data-science-techniques-to-find-patterns-in-the-disneyland-teams-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/abusing-wi-fi-beacons-and-detecting-preventing-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/accelerate-your-investigations-with-domaintools-and-maltego</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/active-defense-7-ways-to-seize-initiative-get-out-in-front-of-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/anatomy-of-a-dns-hijacking-the-fascinating-case-of-the-sea-turtle-campaign</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/anomali-threatstream-powered-by-the-domaintools-iris-investigate-api</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/anticipate-early-stage-threats-with-splunk-and-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/applied-intelligence-practical-wins-using-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/applying-domaintools-intelligence-inside-of-ibm-qradar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/april-showers-and-soc-powers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/artificial-intelligence-machine-learning-applied-to-infosec</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/bringing-new-capabilities-to-the-domaintools-app-for-splunk-webinar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/bringing-the-fire-against-threat-actors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/building-a-proactive-security-posture-with-domaintools-and-threatblockr</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/catching-cybercriminals-exploiting-the-pandemic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/defeating-adaptive-adversaries-using-passive-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/detecting-targeted-spearphishing-campaigns-in-the-preparation-phase-ungated</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/discover-and-block-lookalike-domains-iris-detect</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/discover-and-block-lookalike-domains-iris-detect-emea</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/dissecting-avaddon-to-find-additional-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/dive-into-adversary-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/dns-context-at-your-fingertips-using-iris-investigate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/dns-threat-hunting-exploiting-your-adversaries-dependence-on-domain-names</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/domain-fraud-brand-impersonation-and-ponzi-schemes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/domain-hotlist-guarding-against-emerging-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/domaintools-2023-infosecurity-forecast</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/domaintools-2024-infosecurity-forecast</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/domaintools-and-farsight-security-better-together</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/domaintools-demisto-fied-orchestrating-incident-response</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/domaintools-iris-investigate-guided-tour-of-new-features</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/domaintools-iris-investigate-making-analysis-faster</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/double-edged-sword-employing-and-exploiting-machine-learning-and-ai</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/elevate-your-defenses-with-splunk-and-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/enhance-incident-response-with-the-domaintools-app-for-splunk-phantom</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/eureka-why-dns-is-forensic-gold</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/exploiting-your-adversarys-weak-spot-dns-domain-names-a-natural-fit-for-soa</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/find-threats-before-they-find-you-threat-investigation-with-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/give-bad-actors-more-bad-days-new-enhancements-to-iris-investigate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/give-threat-actors-a-rum-for-their-money</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/good-chemistry-the-integration-between-domaintools-and-sentinel</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/how-domaintools-and-splunkphantom-work-in-harmony-so-you-can-soar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/how-proactive-threat-hunting-techniques-can-help-stop-malware-and-phishing</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/how-to-build-a-robust-cyber-threat-intelligence-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/how-to-effectively-architect-threat-intelligence-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/how-to-elevate-your-threat-intelligence-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/how-to-identify-threats-faster-and-increase-productivity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/how-trickbot-malware-hides-c2-inside-dns-traffic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/how-your-organization-can-improve-security-and-increase-operational-savings</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/hunting-is-easy-brew-can-do-it</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/hunting-threat-actors-is-sub-lime</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/hunting-threat-actors-lifts-my-spirits</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/identifying-benign-websites-the-demise-of-the-alexa-top-million</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/indicators-over-cocktails-domaintools-data-feeds</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/indicators-over-cocktails-iris-investigate-for-financial-services</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/indicators-over-cocktails-sketchy-traffic-spotted-now-what</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/indicators-over-cocktails-special-edition-passive-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/instant-infrastructure-intel</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/integrated-incident-response-a-panel-discussion-sans-2019-ir-survey</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/integrating-domaintools-data-in-the-siem-soar-and-tip</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/intro-to-threat-hunting-with-farsight-dnsdb</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/introducing-the-newest-domaintools-app-for-splunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/investigating-real-world-attacks-with-domain-dns-adversary-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/its-not-finished-the-evolving-maturity-in-ransomware-operations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/learn-to-crawl-walk-soar-with-domaintools-and-splunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/lessons-learned-from-sunburst-to-enhance-future-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/leveraging-red-for-defense</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/making-security-orchestration-automation-and-response-soar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/making-threat-intelligence-actionable-with-domaintools-and-bandura-cyber</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/malicious-intent-and-you-a-primer-on-domaintools-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/passive-dns-strategies-for-aggressive-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/powering-incident-response-by-operationalizing-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/practical-soar-for-dns-and-domain-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/prioritizing-investigations-with-domain-dns-based-adversary-intelligence-2019</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/proactive-infrastructure-hunting-with-threatconnect-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/proactive-network-monitoring-with-domaintools-and-crowdstrike-falcon</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/proactive-protection-against-ransomware-with-crowdstrike-falcon</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/proactively-deter-threats-with-ip-hotlist</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/protecting-your-environment-from-the-unknown-zero-trust-and-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/proven-methods-for-threat-hunting-with-splunk-and-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/put-the-go-in-maltego-with-domaintools-iris-investigate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/raising-your-cyber-investigation-iq</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/reel-big-phish-hunting-for-badness-in-a-sea-of-noise</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/return-to-heartsender-using-domains-to-take-down-the-manipulaters</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/sans-2020-automation-and-integration-survey-panel-discussion</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/sans-2020-threat-hunting-survey-a-panel-discussion</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/sans-2021-report-top-skills-analysts-need-to-master-panel-discussion</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/sans-2021-top-new-attacks-and-threat-report-panel-discussion</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/sans-2022-top-new-attacks-and-threat-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/sans-2022-top-new-attacks-and-threat-report-d4fb5</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/sans-top-new-attacks-and-threat-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/sans-top-new-attacks-and-threat-report-2020</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/sans-vetting-your-intel-techniques-and-tools-for-false-positive-analysis</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/seminar-threat-intelligence-in-the-real-world</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/sign-of-the-tines</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/sing-rye-rye-rye-to-threat-actors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/soaring-with-domaintools-and-ibm-resilient</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/squeeze-the-day-threat-hunt</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/staffing-the-it-security-function-in-the-age-of-automation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/staying-ahead-of-threats-with-domaintools-and-torq</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/steer-clear-of-whiskey-business</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/sunburst-a-deep-dive-into-the-scariest-supply-chain-attack-yet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/supercharge-your-secops-with-the-domaintools-app-for-elastic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/supercharging-the-soc-with-domaintools-mcp</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/surveilling-outbound-dns-queries-to-disrupt-phishing-and-cutting-off-malware-from-cc</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/tactics-techniques-and-victimology-a-look-at-phishing-in-government-systems</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/taking-control-of-your-post-covid-19-budget</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/the-anatomy-of-an-exploit-smbghost</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/the-beginners-guide-to-applying-machine-learning-to-incident-response</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/the-beginners-guide-to-transforming-your-investigations-domaintools-maltego</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/the-best-in-class-experience-introducing-our-new-partner-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/the-is-no-rye-only-do</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/the-solarwinds-incident-what-did-we-learn</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/the-world-wide-web-of-risk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/thinking-like-an-attacker-strategies-for-defense</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/threat-actor-analysis-and-strategic-security-investments</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/threat-hunting-and-brand-protection-as-emergent-gameplay</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/threat-hunting-for-new-and-experienced-hunters-panel-discussion-of-the-sans</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/time-for-a-fruitful-investigation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/tools-techniques-for-false-positive-analysis</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/top-10-ways-attackers-mangle-your-good-domain-name</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/top-5-ways-attackers-disguise-cc-and-exfiltration-traffic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/training-effective-internet-investigations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/transform-your-investigations-with-domaintools-and-maltego</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/turning-the-tables-exploiting-attacker-dependence-on-malicious-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/unlock-the-power-of-predictive-risk-scoring-and-domain-discovery-with-the-domaintools-oem-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/upgrade-the-hunt-with-splunk-and-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/using-a-tip-to-stay-ahead-of-advanced-adversaries</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/using-jupyter-notebooks-for-repeatable-investigation-automation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/using-soar-to-elevate-your-security-operations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/vital-signs-using-dns-to-predict-adversary-moves-in-healthcare</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-2019-no-oscars-for-the-bad-threat-actors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-5-ways-to-get-an-a-in-cybersecurity-dt-cybersecurity-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-5-ways-to-leverage-threat-intel-for-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-applying-the-scientific-method</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-bad-will-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-best-practices-for-building-a-security-technology-strategy</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-best-practices-to-out-maneuver-threat-actors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-best-practices-to-tackle-phishing-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-cyber-threat-hunting-how-to-combat-cyber-threats-and-win-the-battle</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-cybersecurity-report-card</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-day-in-the-life-of-a-ransomware-actor</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-detecting-malicious-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-detecting-targeted-spearphishing-campaigns-in-the-preparation-phase</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-dns-mapping-for-better-context-on-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-dont-let-your-opsec-flounder-what-you-need-to-know-about-phishing</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-effective-threat-monitoring-you-cant-stop-what-you-cant-see</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-emotet-dissecting-the-info-stealing-trojan-that-keeps-going</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-empower-qradar-with-predictive-domain-analytics</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-enrich-your-investigations-with-domaintools-iris-for-maltego</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-essential-components-world-class-security-team</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-farsight-passive-dns-data-with-whois-data-integrated-together</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-finding-quick-wins-in-cybercrime-investigations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-from-the-front-lines</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-guide-to-threat-hunting-with-splunk-and-phantom</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-how-domaintools-misp-enable-effective-threat-intelligence-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-how-investigate-malicious-domains-using-domaintools-threatconnect</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-how-to-analyze-and-investigate-malicious-javascript-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-how-to-build-and-maintain-an-effective-cyberthreat-hunting-team</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-i-caught-a-phish-now-what</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-introducing-domain-risk-score</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-introducing-iris-3</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-introducing-iris-investigate-with-passive-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-level-up-your-soc-with-smarter-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-level-up-your-threat-intel-with-new-iris-apis</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-malware-analysis-and-adversary-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-mapping-adversary-infrastructure-to-block-targeted-campaigns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-mapping-connected-infrastructure-with-threatconnect-and-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-meet-the-siems-the-value-of-event-enrichment</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-practical-application-of-threat-intel</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-sans-2018-cyber-threat-survey-threat-hunting-is-a-process</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-sans-2019-cyber-threat-hunting-survey-cti-requirements</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-sans-cyber-threat-intelligence-survey</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-sans-fingerprinting-threat-actors-with-web-assets</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-sans-mythbusters-ics-edition</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-security-hiring-trends-in-the-age-of-automation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-staying-ahead-of-attackers-dns-blacklisting-for-the-win</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-strategies-for-using-cyber-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-sw-fingerprinting-threat-actors-strategies-and-tactics-that-work</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-the-beginners-guide-to-building-your-incident-response-playbook</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-the-beginners-guide-to-mitigating-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-the-beginners-guide-to-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-the-ioc-and-ioa-playbook-making-sense-of-your-indicators</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-the-power-of-the-pivot</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-threat-hunting-expert-tips-for-building-proactive-threat-hunting-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-tracing-threat-actors-by-their-footprints-and-web-assets</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-trends-in-hotspots-of-malicious-internet-activity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-true-stories-threat-hunting-files</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-turning-fossils-into-gold</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/webinar-understanding-how-attackers-use-malicious-javascript</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/what-to-do-when-youve-been-popped</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/webinars/your-threat-hunting-sixth-sense-domaintools-app-for-splunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/a-look-back-on-the-manipulaters</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/apt-35-threat-brief</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/best-practice-guide-financial-services</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/best-practice-guide-healthcare</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/best-practice-guide-retail</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/best-practice-guide-technology</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/best-practices-guide-federal-government</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/best-practices-how-to-leverage-domain-and-dns-intelligence-for-oems</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/building-a-secure-vps-server-under-debian-11</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/carpe-diem-how-to-seize-the-phish</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/comparing-images-such-as-screenshots-using-perceptual-hashes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/conceptualizing-a-continuum-of-cyber-threat-attribution</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/cybersecurity-outlook-for-2018</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/dealing-with-short-search-terms</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/defending-against-malicious-javascript-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/detecting-malicious-domains-using-ai-and-ml</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/developing-a-threat-hunting-program-checklist-a-5-step-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/dns-forensics-where-intuition-meets-experience</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/domains-that-begin-with-a-digit</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/esg-economic-benefits-of-domaintools-internet-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/formulating-a-robust-pivoting-methodology</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/how-whois-data-ensures-a-safe-and-secure-internet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/hunting-rats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/inside-salt-typhoon-chinas-state-corporate-advanced-persistent-threat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/ipv4-address-space-in-dnsdb</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/ipv6-deployment-on-the-internet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/mcp-server-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/post-gdpr-security-investigations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/powering-incident-response-by-operationalizing-threat-intelligence-whitepaper</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/protected-waters-no-spear-phishing-allowed</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/sans-2020-top-new-attacks-and-threat-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/sans-2021-report-top-skills-analysts-need-to-master</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/sans-2021-top-new-attacks-and-threat-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/sans-2022-top-new-attacks-and-threat-report-paper</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/sans-top-new-attacks-and-threat-report-whitepaper</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/security-orchestration-automation-and-response-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/siem-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/speeding-up-dnsdb-queries-via-parallelization</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/strategies-to-vet-your-threat-intelligence-and-reduce-false-positives</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/the-def-con-recon-village-subdomain-enumeration-challenge-a-retrospective</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/the-knownsec-leak</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/the-rise-of-threat-hunting-and-why-it-matters</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/the-value-of-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/the-value-of-threat-intelligence-with-domaintools-identify-threats-faster</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/threat-intelligence-playbook-making-sense-of-indicators</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/why-retailers-are-losing-the-fight-against-online-counterfeiting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/white-papers/zero-trust-and-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/a-guide-to-dnsdb-scout-api-endpoints</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/advanced-exchange-access-axa</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/advanced-exchange-access-axa-toolkit-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/advanced-exchange-access-axa-understanding-accounting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/an-introductory-guide-to-dnsdb-scout</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/an-introductory-guide-to-flexible-search-with-dnsdb-scout</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-api-technical-datasheet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-api-technical-overview</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-api-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-app-for-splunk-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-export-dnsdb-api-on-premises-overview</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-export-requirements</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-export-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-farsight-compatible-regular-expressions-fcre-reference-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-flexible-search-api-programmers-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-frequently-asked-questions-faq</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-glob-reference-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-qradar-integration-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-scout-export-installation-for-debian-buster</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-scout-export-installation-for-rhel-7-and-centos-7</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-scout-export-installation-for-ubuntu-20</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdb-splunk-integration-technical-overview</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdbflex-dnsdb-flexible-query-tool</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdbq-dnsdb-query-tool</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/dnsdbq-technical-overview</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domain-discovery-feed</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domain-hotlist</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domain-risk-score-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domain-search</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domaintools-app-for-anomali</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domaintools-app-for-demisto</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domaintools-app-for-elastic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domaintools-app-for-ibm-qradar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domaintools-app-for-ibm-resilient</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domaintools-iris-and-farsights-dnsdb-integration</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domaintools-iris-detect</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domaintools-iris-integration-for-thehive-and-cortex</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/domaintools-iris-investigate---updates</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/farsight-dnsdb-api-version-1-documentation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/farsight-dnsdb-api-version-2-documentation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/farsight-nod-dnsbl-with-rbldnsd-and-bind-9-9-on-debian-8-x</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/farsight-resilient-integration-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/farsight-securitys-maltego-dnsdb-integration</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/farsight-streaming-api-framing-protocol-documentation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/hosting-ip-risk-feed</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/ip-hotlist</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/iris-investigate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/iris-investigate-quick-start-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/iris-investigate-user-guide-part-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/maltego-transforms-technical-reference</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/monitors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/newly-observed-domains-nod-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/nod-as-a-dns-response-policy-zones-firewall</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/nuances-in-dnsdb-time-fencing</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/phisheye</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/security-information-exchange-sie-darknet-channel</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/security-information-exchange-sie-newly-active-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/security-information-exchange-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/sie-batch-technical-overview</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/sie-batch-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/sie-nmsg-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/splunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/sra-and-axa-restful-interface-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/the-advanced-exchange-access-axa-missing-manual</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/the-axa-api-reference</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/the-axa-technical-overview</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/the-axa-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/using-maltego-with-farsight-dnsdb-transforms</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/whois</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/user-guides/whois-history</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/anthem-breach-investigation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/case-study-red-canary-crimeware-investigation-connecting-the-dots-with-farsight-nod</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/cyber-forensics-firm-uses-domaintools-to-crack-global-hacking-syndicate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/deloitte-touche-llp-case-study</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/domaintools-helps-global-telecommunications-company-case-study</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/domaintools-helps-investigate-advanced-persistent-threats-and-protect-brand</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/domaintools-iris-investigate-helps-l3harris-technologies-investigate-apts</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/g2-uses-domaintools-to-prevent-payment-fraud-and-illegal-transactions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/how-a-fortune-15-technology-enterprise-proactively-detects-advanced-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/how-threatconnect-leverages-dnsdb-to-track-down-the-grizzly-steppe</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/king-union-case-study-avalon-and-dnsdb-expose-emotet-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/lujam-leverages-farsight-securitys-newly-observed-domains-nod-solution-to-address-zero-day-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/major-metropolitan-government-agency-embraces-domain-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/sunburst-mapping-malicious-activity-using-farsight-historical-passive-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/case-studies/walk-on-the-wild-side-get-to-know-cozy-bear</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/2018-threat-hunting-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/2018-threat-intelligence-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/2019-ponemon-survey-report-staffing-the-it-security-function</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/2020-ponemon-survey-report-staffing-the-it-security-function</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/2020-sans-automation-and-integration-survey</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/ema-radar-for-digital-threat-intelligence-management-q4-2017</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/ema-security-megatrends-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/osterman-research-white-paper</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/ponemon-survey-2018</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/sans-2018-cyber-threat-hunting-survey</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/sans-2019-cyber-threat-hunting-survey</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/sans-2019-cyber-threat-intelligence-survey</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/sans-2019-incident-response-survey-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/sans-2020-cyber-threat-intelligence-survey</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/sans-2020-threat-hunting-survey</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/sans-2021-threat-hunting-survey</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/survey-report-2018-cybersecurity-report-card</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/survey-report-2019-cybersecurity-report-card</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/survey-report-2020-cybersecurity-report-card</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/the-2019-threat-hunting-report-survey</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/the-2020-threat-hunting-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/the-2021-threat-hunting-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/survey-reports/the-2022-threat-hunting-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/100-fake-chrome-extensions-found-hijacking-sessions-stealing-credentials-injecting-ads</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/100-malicious-chrome-extensions-attacking-users-to-exfiltrate-login-credentials-execute-remote-code</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/2019-ponemon-study-on-automation-and-cybersecurity-staffing-in-asia-pacific</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/2020-04-20-weekly-threat-advisory</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/2020-a-year-of-deepfakes-and-deep-deception</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/2020-in-cyber-the-view-from-the-security-frontline</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/2021-threat-predictions-bad-actors-that-honed-their-craft-with-covid-are-re</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/21-cybersecurity-trends-experts-are-diligently-watching-in-2020</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/3-areas-of-implicitly-trusted-infrastructure-that-can-lead-to-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/47-most-innovative-cyber-security-startups-companies-seattle</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/5-channel-partner-program-and-msp-market-news-updates</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/5-channel-partner-program-and-msp-market-news-updates-08-november-2022</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/5-commercial-software-attacks-and-what-you-can-learn-from-them</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/5-simple-ways-to-check-a-websites-safety</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/5-threat-intel-tricks-mssps-can-use-to-thwart-adversaries</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/5-tips-for-building-a-cybersecurity-culture-at-your-company</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/51-say-automation-will-result-in-job-loss-for-it-security-pros</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/6-ways-attackers-are-exploiting-the-covid-19-crisis</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/61-of-cisos-surveyed-fearing-a-decline-in-cyber-security-skills-cybersecuri</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/81-percent-of-cybersecurity-pros-agree-cyber-threat-intelligence-improves-p</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/87-million-lost-to-crypto-drainer-as-inferno-malware-fools-customers-with-coinbase-seaport-connection-protocols</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/911-proxy-service-implodes-after-disclosing-breach</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-day-in-the-life-of-a-prolific-voice-phishing-crew</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-fake-coronavirus-tracking-app-is-actually-ransomware-that-threatens-to-le</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-guide-to-doing-cyberintelligence-on-a-restricted-budget</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-list-of-seattle-cybersecurity-companies-as-international-conflict-fuels-i</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-new-and-dangerous-malware-infects-roundcube-webmail</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-new-cyberespionage-campaign-from-chinas-apt15</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-serial-tech-investment-scammer-takes-up-coding</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-third-of-the-uk-plans-to-grab-a-bargain-this-cyber-monday</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-trojan-downloading-website-is-imitating-a-popular-antivirus-website</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-vmi-student-newspaper-won-a-major-prize-but-now-there-are-questions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-website-has-been-exposed-tricking-unsuspecting-users-into-downloading-a-c</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-west-african-advisor-impersonation-ring-is-now-impersonating-finra</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/a-whos-who-of-ransomware-groups-when-it-comes-to-consumer-trust-gdpr-might-be-a-catch-22</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/aa20-099a-covid-19-exploited-by-malicious-cyber-actors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/about-coronavirus-app-locks-android-screens-with-repackaged-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/after-ransomware-attack-company-finds-650-breached-credentials-from-new-coo</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/after-the-impact-of-the-change-united-healthcare-ransomware-attack-hhs-bolsters-healthcare-cybersecurity-initiatives</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/alarming-trends-reinforced-in-ransomware-attack-of-semiconductor-mfr</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/alarming-trends-reinforced-in-ransomware-attack-of-semiconductor-mfr-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/alexa-ranking-service-shutdown-to-impact-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/alumni-data-exposed-at-oxford-third-party-exposure-ransomware-at-healthca</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/amateur-hacker-leverages-russian-bulletproof-hosting-server-to-spread-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/amazons-lack-of-public-disclosure-on-solarwinds-hack-angers-lawmakers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/amazons-shuttering-of-alexa-ranking-service-hits-cybersecurity-industry</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/amid-an-embarrassment-of-riches-ransom-gangs-increasingly-outsource-their-w</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/android-fans-beware-delete-this-app-now-or-your-phone-could-be-wiped-of-eve</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/android-users-be-careful</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/android-users-this-coronavirus-tracking-app-is-a-scam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/android-users-warned-about-40-malware-ridden-apps-that-entice-you-with-free</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/anti-quarantine-websites-usually-dont-relate-to-covid-19-heres-why-theyre-m</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/apt-trends-report-q2-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ardent-health-services-grapples-with-ransomware-disruption</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/are-you-a-gig-worker-heres-how-you-can-protect-yourself-from-fraud-on-rideshare-and-delivery-apps</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/around-the-world-in-90-days-state-sponsored-actors-try-clickfix</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/arrested-development-top-hacker-busts-of-2024</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ars-technica-hackers-exploit-blind-spot-malware-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/as-christmas-approaches-20-of-brits-reveal-they-have-been-duped-by-scam-ema</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/as-phishing-attacks-continue-to-scam-shoppers-domaintools-data-showcases-mo</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/as-you-modernize-your-soc-remember-the-human-element</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/asia-division-of-cyber-insurance-company-axa-hit-with-ransomware-attack-zdn</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/automation-augments-human-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/automation-will-improve-security-function</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/avaddon-ransomware-group-closes-shop-sends-all-2934-decryption-keys-to-blee</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/avaddon-ransomware-joins-data-leaking-club</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/bandura-cyber-intelligence-marketplace-deploys-cyber-intelligence-data-acro</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/banking-trojans-attacking-android-users-mimic-as-government-and-legitimate-payment-apps</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/baphomet-backs-out</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/battery-ventures-makes-majority-investment-in-seattle-enterprise-security-s</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/bec-fraud-research-92-domains-spoofing-international-law-firms</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/bec-group-crimson-kingsnake-linked-to-92-malicious-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/behind-the-mask-of-madgicx-plus-a-chrome-extension-campaign-targeting-meta-advertisers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/best-tools-to-trace-an-ip-address</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/beware-of-website-mimicking-google-play-store-pages-to-deliver-android-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/biden-issues-a-executive-order-to-address-port-cybersecurity-and-maritime-threats-on-the-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/bitdefender-warns-discord-users-of-rampant-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/bitesize-the-doppelpaymer-malware-threat-with-chad-anderson-of-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/bitpylock-ransomware-evolves-its-tactics</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/black-hat-conference-yields-new-cybersecurity-products</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/black-proxies-use-187000-plus-ip-addresses-to-launch-credential-stuffing-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/blackcat-goes-dark-after-ripping-off-change-healthcare-ransom</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/blackproxies-proxy-service-increasingly-popular-among-hackers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/blockthreat-week-36-2025</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/bofa-vendor-data-breach-amplifies-third-party-risks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/bogus-fact-checking-site-amplified-by-dozens-of-indian-embassies-on-social</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/bogus-google-play-pages-tapped-for-spynote-malware-distribution</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/booming-market-for-fake-covid-19-vaccine-passports-sparks-alarm</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/bot-freakout-leverages-three-critical-vulnerabilities-to-attack-linux-syste</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/brand-impersonation-phishing-scams-by-a-chinese-threat-actor-employs-42000-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/british-passport-data-exposed-on-unsecured-aws-bucket</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/bulletproof-host-stark-industries-evades-eu-sanctions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/businesses-often-do-not-inform-customers-of-tracking</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/can-the-neurodiverse-community-help-to-close-the-cybersecurity-skills-gap</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/canada-charges-its-most-prolific-cybercriminal</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/caramel-credit-card-stealing-service-is-growing-in-popularity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/caramel-new-credit-card-skimmer-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cat-and-mouse-privacy-advocates-fight-back-after-china-tightens-surveillanc</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cert-safari-leveraging-tls-certificates-to-hunt-evil</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/change-healthcare-cyberattack-fallout-continues</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/change-in-routines-can-create-new-opportunities-for-hackers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/chenluns-evolving-phishing-tactics-target-trusted-brands</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/chenluns-evolving-phishing-tactics-target-trusted-brands-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/china-backed-salt-typhoon-targets-u-s-internet-providers-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/chinas-salt-typhoon-cooks-up-cyberattacks-on-us-isps</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/chinas-tonto-team-apt-ramps-up-spy-operations-against-russia</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/chinese-state-sponsored-cyber-espionage-activity-supports-expansion-of-regi</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/chinese-threat-actor-exploited-solarwinds-vulnerability-second-stage-backd</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/chrome-extension-scam-exposed-hackers-stealing-meta-accounts</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/chrome-users-beware-100-malicious-extensions-still-active</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cisa-advisory-on-lockbit-91-million-extorted-from-1700-attacks-since-2020</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cisa-alert-lockbit-ransomware-extorted-91-million-from-us-organizations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cisa-and-fbi-issue-joint-advisory-on-exchange-server-hafnium-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cisa-and-hhs-would-team-up-in-health-sector-under-house-bill</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cisa-lockbit-behind-1-in-6-ransomware-attacks-on-us-govt-in-2022</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ciso-faces-fraud-charges-over-massive-breach</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ciso-paychecks-worth-the-growing-security-headaches</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cisos-in-2025-balancing-security-compliance-and-accountability</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/city-of-oakland-declares-state-of-emergency-after-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/city-of-wichita-public-services-disrupted-after-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/claims-of-ties-between-ransomware-groups-met-with-skepticism-among-threat-r</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/classiscam-fake-ads-hit-european-market</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cloud-storage-and-ransomware-phishing-covid-test-data-leaked-covid-track</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/companies-are-rushing-to-introduce-coronavirus-testing-kits-and-so-are-scam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/compliance-emerging-technology-will-fuel-financial-tech-funding-in-2022</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/consumers-scammed-out-of-thousands-of-dollars-from-fake-banking-app</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/coronavirus-crypto-scams-flourish-amidst-covid-19-pandemic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/coronavirus-fearware-sees-hackers-exploit-covid-19-panic-to-target-victims</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/coronavirus-hackers-face-the-wrath-of-the-cybersecurity-community</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/coronavirus-related-malware-crops-up-how-to-unlock-your-phone</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/coronavirus-scams-how-to-protect-yourself-from-identity-theft-during-covid</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/coronavirus-scams-target-your-fear-dont-let-them</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/coronavirus-spurs-a-wave-of-suspect-websites-looking-to-cash-in</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/coronavirus-themed-cyber-attacks-ramp-up-consumers-and-companies-must-pract</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/coronavirus-tracking-app-locks-up-android-phones-for-ransom</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/coronavirus-tracking-websites-fake-vs-genuine</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/coronavirus-vaccine-hackers-target-groups-in-covid-19-vaccine-distribution</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/coronavirus-why-are-people-making-fake-covid-vaccine-cards-florida-news-tim</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/could-automation-kill-the-security-analyst</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/covid-19-disinformation-is-a-growing-dangerous-problem</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/covid-19-phishing-might-be-goblin-panda-ubiquiti-confirms-extortion-attemp</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/covid-19-testing-center-hit-by-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/covid-19-vaccine-cards-the-only-proof-of-vaccination-create-demand-for-fake</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/covid19-domain-classifier</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/covidlock-crypto-jacking-app-disguises-itself-as-a-coronavirus-infection-ma</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/covidlock-exploits-coronavirus-fears-with-bitcoin-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/covidlock-ransomware-exploits-coronavirus-with-malicious-android-app</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/credit-card-skimming-services-make-it-easy-for-low-level-cybercriminals-to</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/criminal-proxy-services-the-cyberwire</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/crimson-kingsnake-bec-group-impersonates-law-firms</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/crooks-use-a-fake-antivirus-site-to-spread-venom-rat-and-a-mix-of-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/crypto-scams-capitalize-on-coronavirus-panic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cyber-chiefs-brace-for-major-attacks-in-next-12-months</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cyber-crime-roundtable-assessing-the-peaks-of-lockdown</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cyber-insights-2025-the-ciso-outlook</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cyber-security-todays-phishing-service-taken-down-phony-covid-vaccination-d</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cyber-thieves-using-coronavirus-fears-to-steal-bitcoin-btc-and-cryptocurren</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cyber-threat-intelligence-cti-management-now-more-than-ever</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cyberattacks-up-but-companies-mostly-succeed-in-securing-remote-workforce</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybercrime-is-still-evil-incorporated-but-disruptions-help</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybercrime-is-still-evil-incorporated-but-disruptions-help-databreachtoday</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybercrime-rapper-sues-bank-over-fraud-investigation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybercriminals-clone-antivirus-site-to-spread-venom-rat-and-steal-crypto-wallets</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybercriminals-flood-internet-with-over-thousand-malicious-domains-daily</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybercriminals-use-facebook-ads-to-shame-companies-confuse-messaging-to-cus</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybereason-researchers-find-new-north-korean-malware-suite</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybersecurity-company-warns-of-american-rescue-plan-act-scams-as-first-irs</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybersecurity-experts-trace-the-online-movement-of-reopen-america</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybersecurity-ma-roundup-40-deals-announced-in-november-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybersecurity-ma-roundup-for-second-week-of-november-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybersecurity-news-chinese-threat-actors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybersecurity-podcasts-with-categories</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybersecurity-predictions-for-2020-45-industry-experts-have-their-say</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybersecurity-predictions-for-2020-what-do-experts-think</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cybersecurity-study-reveals-rise-of-threat-hunting-to-combat-of-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cyberthreat-trends-to-watch-in-2022</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cyberwire</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/cyberwire-daily-briefing-for-01-09-25</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/dark-reading</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/dark-reading-financial-advisor-impersonation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/data-breaches-are-no-more-common-despite-home-working</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/data-leak-exposes-hr-details-held-by-british-consultancy-firms</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/data-leak-sheds-light-on-kimsuky-operations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/data-privacy-day-2020-the-view-from-the-frontline</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/data-stealing-chrome-extensions-impersonate-fortinet-youtube-vpns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/deepfake-porn-app-clothoff-claims-to-be-donating-to-help-ai-victims</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/defining-defying-cybersecurity-staff-burnout</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/delete-these-texts-just-24-hours-to-hack-your-phone</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/delete-this-coronavirus-app-from-your-android-phone-immediately</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/democrats-want-dhs-changes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/did-foreign-powers-have-any-impact-on-the-2024-u-s-election</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/disinformation-fanned-chaos-during-recent-protests-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/disinformation-via-hijacked-websites-solarwinds-exchange-server-investigat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/do-not-click-on-any-of-these-websites-on-your-pc</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/do-not-click-this-message-just-10-minutes-to-hack-your-phone</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domain-and-dns-intelligence-can-combat-cybercrime</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domain-blooms-identifying-domain-name-themes-targeted-by-threat-actors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domain-marketplace-stops-sale-of-coronavirus-related-website-listings</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domain-takeaway-powered-by-lieferando</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-2020-predictions-the-changing-security-frontline</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-acquires-farsight-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-acquires-farsight-security-to-enhance-its-threat-intelligence-c</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-acquires-farsight-security-will-mssps-gain-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-adds-four-new-members-to-the-companys-leadership-team</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-and-farsight-security-join-forces-to-power-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-and-ponemon-institute-report-automation-and-ai-will-exacerbate</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-and-splunk-provide-unmatched-actionable-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-and-splunk-provide-unmatched-actionable-threat-intelligence-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-announces-acquisition-of-farsight-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-announces-acquisition-of-farsight-security-to-deliver-best</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-announces-acquisition-of-farsight-security-to-deliver-best-in-c</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-announces-app-for-elastic-users</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-announces-availability-of-iris-detect</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-announces-domain-hotlist</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-announces-enhanced-app-for-splunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-announces-strategic-investment-from-battery-ventures</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-app-for-splunk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-appoints-vp-of-product-and-vp-of-engineering</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-attracts-strategic-investment-from-battery-ventures</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-broadens-accessibility-of-enterprise-grade-cyber-threat-intel</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-debuts-new-domain-discovery-and-monitoring-solution-iris-detect</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-debuts-new-domain-discovery-solution-delivering-real-time-advan</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-debuts-new-domain-discovery-solution-iris-detect</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-deliver-threat-intelligence-presentation-at-prestigious-first</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-expands-cybersecurity-research-team</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-expands-executive-team-appoints-chad-bacher-as-chief-product-officer</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-expands-executive-team-following-strategic-acquisition</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-expands-executive-team-following-strategic-acquisition-of-farsi</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-expands-fast-growing-leadership-team</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-expands-leadership</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-featured-presenters-at-art-into-science-a-conference-on-defense-acod</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-highlights-the-power-of-dns-at-2024-nicar-conference-for-investigative-journalism</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-identifies-threat-group-actively-spoofing-fortune-500-retailer</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-integrates-with-anomali</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-introduces-global-partner-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-introduces-new-domain-discovery-and-ip-risk-feeds</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-introduces-new-threat-hunting-capabilities-in-iris</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-invests-in-domain-dns-research-with-launch-of-domaintools-investigations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-iris-investigation-platform-v3-0</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-iris-now-offers-collaboration-features-for-improved-teamwork</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-is-a-proud-participant-in-the-microsoft-copilot-for-security-partner-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-joins-ibm-security-app-exchange-community</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-joins-splunk-adaptive-response-initiative-at-conf2016</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-kicks-off-threat-intelligence-workshop-series-in-new-york-city</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-launches-domaintools-investigations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-launches-global-partner-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-launches-global-partner-program-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-launches-global-partner-program-to-bring-best-in-class-internet-intelligence-and-threat-hunting-capabilities-to-enterprise-security-teams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-launches-global-partner-program-to-bring-best-in-class-internet-intelligence-and-threat-hunting-capabilities-to-enterprise-security-teams-ef-bf-bc</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-launches-innovative-predictive-domain-risk-scoring-model</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-launches-mcp-server-connecting-ai-agents-directly-to-20-years-of-domain-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-launches-new-channel-partner-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-launches-new-cyber-threat-solution-phisheye</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-make-the-internet-a-safer-place-for-everyone</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-named-prestigious-value-leader-in-emas-inaugural-radar-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-partners-get-new-global-channel-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-predicts-top-cybersecurity-trends-facing-organizations-in-2018</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-presents-hotspots-of-malicious-domains-patterns-and-trends</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-releases-integration-with-maltego-streamlined-incident-response</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-sean-mcnee-on-how-china-is-watching-the-russia-ukraine-conflict</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-security-pros-weigh-in-on-top-cybersecurity-trends-for-2017</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-selected-for-odni-sentinel-horizon-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-showcases-powerful-internet-intelligence-at-gisec-global-2025-to-defend-organizations-from-emerging-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-showcases-powerful-internet-intelligence-at-gisec-global-2025-to-defend-organizations-from-emerging-threats-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-strengthens-leadership-team-with-four-new-senior-executives</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-supports-the-open-source-security-community-and-its-customers-w</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-takes-home-geekwire-bootstrapper-of-the-year-award</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-taps-security-industry-veterans-for-advisory-board</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-to-co-host-sans-webinar-on-cyber-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-to-deliver-phishy-domain-names-presentation-at-fireeye-cyber</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-to-host-webinar-best-practices-for-building-a-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-to-present-on-dark-web-of-cyber-terror-at-first-conference-2017</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/domaintools-uncovers-spoofed-media-domains-in-state-of-the-domain-study</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/dont-attack-hospitals</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/dont-download-these-bogus-coronavirus-tracking-android-apps</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/dont-fall-for-it-fake-bitdefender-site-will-infect-your-pc-with-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/dont-fall-for-it-fake-bitdefender-site-will-infect-your-pc-with-malware-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/doordash-driver-locked-out-of-account-after-being-hacked-security-experts-say-more-gig-workers-are-vulnerable</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/doordash-seeks-an-even-higher-valuation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/dslroot-proxies-and-the-threat-of-legal-botnets</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/dutch-chipmaker-nexperia-suffers-a-data-breach-that-exposed-sensitive-information</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/e-crime-rapper-punchmade-dev-debuts-card-shop</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/effective-threat-hunting-queries-in-a-redacted-world</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/election-insecurity-what-you-may-have-missed</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/emergency-vote-allows-debt-collectors-to-work-from-home</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/endpoint-security-and-network-monitoring-news-for-the-week-of-october-14</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/enhanced-domaintools-app-for-ibm-qradar-enables-security-teams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/enzo-biochem-discloses-ransomware-attack-exposing-clinical-test-data-of-2-5-million-patients</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/estee-lauder-breach-what-do-the-experts-think</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/eu-ban-on-anonymous-domain-registration-welcomed-by-threat-intel-firm</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/eu-introduces-new-legislation-ending-anonymous-domain-registration</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/europes-largest-mobile-operator-orange-hit-by-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/eus-cyber-resilience-act-could-make-smart-devices-safer-for-all-of-us</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/even-replacing-the-hard-drive-wont-remove-this-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/exclusive-doge-official-at-doj-bragged-about-hacking-distributing-pirated-software</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/exclusive-doge-staffer-big-balls-provided-tech-support-to-cybercrime-ring-records-show</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/exclusive-fbi-reports-flood-of-ransomware-attacks-health-care-companies-und</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/exclusive-google-locks-afghan-government-accounts-as-taliban-seek-emails</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/executive-moves</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/exit-scam-blackcat-ransomware-group-vanishes-after-22-million-payout</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/expert-insight-on-classiscam-expands-to-europe</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/expert-on-whatsapp-launches-factcheck-feature-aimed-at-viral-messages</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/expert-reaction-on-estee-lauder-data-exposure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/experts-insight-on-fintech-unicorn-dave-data-breach</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/experts-on-delaware-county-pays-500000-ransom-to-doppelpaymer-gang</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/experts-on-google-chrome-82-to-enhance-privacy-via-new-cookie-settings</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/experts-on-google-said-it-took-down-ten-influence-operation-campaigns-in-q2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/experts-reaction-on-researcher-finds-vulnerability-in-whatsapp-desktop-plat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/exposed-and-condemned-russian-lockbit-ransomware-ringleader-revealed-indicted-sanctioned-and-banned</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/exposed-kim-dump-exposes-kimsuky-hackers-new-tactics-techniques-and-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/facebook-ads-posted-to-shame-campari-to-pay-its-ransom-report-says</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/facebook-removes-inauthentic-assets-connected-to-georgian-far-right-group-a</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fake-android-coronavirus-trackers-are-being-used-to-steal-bitcoin</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fake-bitdefender-site-spreads-password-stealing-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fake-bitdefender-site-spreads-trio-of-malware-tools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fake-bitdefender-website-used-to-spread-infostealer-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fake-covid-19-tracker-app-delivers-ransomware-disinformation-abounds</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fake-docusign-gitcode-sites-spread-netsupport-rat-via-multi-stage-powershell-attack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fake-docusign-pages-deliver-multi-stage-netsupport-rat-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fake-docusign-sites-spread-netsupport-rat-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fake-google-play-store-websites-deliver-potent-rat-to-steal-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fake-news-influenced-us-elections-only-education-can-prevent-it-from-happen</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fake-telegram-desktop-app-malware-campaign-persists</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/false-positives-in-microsoft-defender</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fbi-dutch-police-disrupt-manipulaters-phishing-gang</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fbi-in-threat-warning-after-surge-in-spoofed-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fbi-iranian-cyber-actors-sent-death-threats-to-us-election-officials</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fbi-links-iran-to-online-hit-list-targeting-top-officials-whove-refuted-tru</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fbi-warns-of-email-spoofing-by-north-korean-threat-actor-kimsuky</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fbi-warns-students-against-loan-forgiveness-scammers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/feds-seize-6-4m-veriftools-fake-id-marketplace-but-operators-relaunch-on-new-domain</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fighting-coronavirus-themed-ransomware-and-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fin6-attackers-target-recruiters-with-fraudulent-resumes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fin6-cybercriminals-pose-as-job-seekers-on-linkedin-to-hack-recruiters</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fin6-distributes-more-eggs-malware-via-sophisticated-campaigns-leveraging-trusted-services</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fin6-exploits-hr-workflows-to-breach-corporate-defenses</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fin6-hackers-mimic-as-job-seekers-to-target-recruiters-with-weaponized-resumes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fin6-hackers-pose-as-job-seekers-to-backdoor-recruiters-devices</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fin6-uses-aws-hosted-fake-resumes-on-linkedin-to-deliver-more-eggs-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/finastra-says-malware-attack-contained-data-safe</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/five-tips-for-building-a-cybersecurity-culture-at-your-company</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/flaws-in-whatsapp-could-expose-users-to-malicious-links</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/florida-cyber-attack-raises-alarms-over-security-of-water-treatment-plants</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/follow-the-money-the-cybersecurity-way</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/for578-threat-intelligence-thoughts-and-experience</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/former-nso-employees-says-the-company-impersonated-facebook-to-deploy-malwa</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fourth-annual-cybersecurity-report-card-breaches-at-standstill</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fourth-stimulus-check-update-fake-relief-fund-sites-could-steal-your-identi</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/france-ties-russias-sandworm-to-a-multiyear-hacking-spree</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/fraudsters-aim-to-capitalize-on-student-loan-forgiveness-confusion</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/freecryptoscam-a-new-cryptocurrency-scam-that-leads-to-installation-of-back</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/from-amazon-to-target-hackers-mimic-top-brands-in-global-crypto-scam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/from-isolated-hackers-to-organized-syndicates-ransomware-connections-revealed</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/gamarue-schools-remote-learners-lessons-from-solorigate-new-zealand-centr</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/game-source-code-sold-online-bloomberg-renews-claims-of-chinese-hardware-ba</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/gao-urges-action-to-address-critical-cybersecurity-challenges-facing-u-s</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/generative-ai-software-and-features-are-being-shoehorned-in-across-all-industries</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/german-investigators-identify-crypto-millionaire-behind-revil-operations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/german-pirate-party-member-claims-eu-plans-for-a-gdpr-compliant-whois-v2-wi</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/glitch-service-abused-to-host-short-lived-phishing-sites</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/global-pandemic-was-an-inflection-point-that-put-cybersecurity-teams-grades</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/global-report-card-survey-reveals-cybersecurity-program-trends</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/google-blocks-30-malicious-domains-used-by-hack-for-hire-groups</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/google-blocks-over-thirty-malicious-domains-used-by-hackers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/google-chrome-warning-never-use-any-website-thats-on-this-list</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/googles-android-update-bad-news-for-samsung-and-pixel-users</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/googles-zip-mov-domains-give-social-engineers-a-shiny-new-tool</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/government-revs-up-it-security-automation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/governments-must-also-combat-coronavirus-infodemic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/grucul-toxic-permissions-leave-aws-s3-buckets-vulnerable-to-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hack-exposes-vulnerability-of-cash-strapped-us-water-plants</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hack-suggests-new-scope-sophistication-for-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hacked-us-commerce-and-treasury-departments</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hacker-bounty-fever-dopamine-spikes-and-millions-of-dollars</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-abusing-glitch-platform-to-steal-credentials</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-are-making-fake-coronavirus-tracking-apps-that-are-actually-ransomw</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-are-now-pretending-to-be-jobseekers-to-spread-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-are-selling-coronavirus-special-hacking-tools-on-dark-web-check-poi</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-are-spreading-fake-android-coronavirus-trackers-to-steal-your-bitco</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-are-swarming-microsoft-exchange</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-are-using-fake-coronavirus-tracking-application-to-ransom-crypto</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-are-using-fake-google-play-store-pages-to-infect-android-phones-with-a-dangerous-trojan-how-to-stay-safe</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-cybersquat-on-hundreds-of-luxury-fashion-brand-domains-to-spoof</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-cybersquat-on-hundreds-of-uk-bank-domains-to-spoof-and-exploit-user</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-mimic-google-chrome-install-page-on-google-play-to-deploy-android-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-mimic-popular-antivirus-site-to-deliver-venomrat-steal-finance-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-rushed-in-as-microsoft-raced-to-avert-mass-cyber-attack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-rushed-in-as-microsoft-raced-to-avert-mass-cyber-attack2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-sell-compromised-emails-and-google-ads-accounts-on-dark-web</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-start-selling-change-healthcare-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hackers-target-groups-in-covid-19-vaccine-distribution</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hacking-disaster-warning-delete-all-these-emails-on-your-pc</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hacking-has-lately-seen-a-sharp-surge-amid-coronavirus-outbreak-where-hacke</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/half-of-british-consumers-are-happy-to-shop-with-previously-breached</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hire-me-to-drop-malware-on-your-computer</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-a-worldwide-subscription-scam-network-was-traced-back-to-montreal-cbc-n</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-are-cybercriminals-acquiring-cryptocurrency-by-exploiting-the-covid-19</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-are-uk-tech-startups-helping-fight-coronavirus</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-cybercrime-empires-are-built</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-cybercriminals-are-actively-exploiting-the-coronavirus-covid-19-crisis</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-did-the-exchange-server-exploit-leak</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-disinformation-targeted-governments-amid-national-protests</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-do-i-add-covid-or-any-threat-intelligence-from-the-internet-to-splunk-e</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-doordash-and-uber-eats-are-fighting-back-against-couriers-using-false-identities</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-frameworks-can-sharpen-security-strategies-and-develop-soft-skills</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-hackers-can-up-their-game-by-using-chatgpt</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-north-koreas-cyber-war-chases-espionage-and-crypto-heists</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-poor-security-culture-leads-to-insider-risk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-russian-disinformation-campaigns-exploit-domain-registrars</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-scammers-are-exploiting-the-war-in-ukraine</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-scammers-hide-in-an-email-to-steal-money-from-home-buyers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-security-teams-can-defend-against-becs</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-security-vendors-are-aiding-ukraine</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-the-kim-dump-exposed-north-koreas-credential-theft-playbook</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-the-may-2021-biden-cybersecurity-eo-set-the-industry-in-motion</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-the-solarwinds-attack-may-affect-your-organizations-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-the-solarwinds-hackers-hid-their-work</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-threat-actors-are-repurposing-digital-analytic-tools-to-amplify-their-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-to-avoid-end-of-year-donation-scams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-to-deal-with-malware-on-windows-nuke-and-pave-often-is-the-only-way</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-to-handle-genai-security-issues</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-to-look-up-an-ip-address-owner</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-to-spot-fake-online-reviews-and-false-advertising</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/how-to-start-your-cybersecurity-career-expert-tips-and-guidance</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/https-news-risky-biz-risky-bulletin-chinese-hackers-breach-us-treasury-target-ofac-bureau</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/https-www-infosecurity-magazine-com-news-spynote-malware-targets-android</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/hunters-of-cyberattackers-go-up-against-crafty-ransomware-gangs</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ibm-warns-hackers-targeting-covid-vaccine-cold-chain-supply-process</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/iconburst-supply-chain-attack-uses-typo-squatting-to-spread-malicious-javas</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/implementing-continuous-security-for-microservices-and-kubernetes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/improving-your-cybersecurity-readiness-four-key-takeaways-from-our-recent-webinar</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/in-wake-of-php-git-server-attack-researcher-advises-developers-to-enable-en</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/in-wake-of-solarwinds-and-vietnam-more-supply-chain-attacks-expected-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/in-wake-of-solarwinds-hack-here-are-the-critical-responses-required-of-all</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/indias-prime-minister-narendra-modi-twitter-account-hacked</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/indonesian-army-wields-internet-news-as-a-weapon-in-papua</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/industry-experts-on-verizon-dbir-2020</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/industry-reactions-to-u-s-water-plant-hack-feedback-friday</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/industry-reactions-to-verizon-2020-dbir-feedback-friday</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/infosecurity-magazine-pig-butchering-west-africa-us</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/infrastructure-research-and-hunting-boiling-the-domain-ocean</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/innovating-with-gpt-3</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/insikt-group-discovers-global-credential-harvesting-campaign-using-fierceph</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/intelligence-sharing-in-action-covid-19-cyber-threat-coalition</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/international-discussions-of-ransomware-the-coming-threat-of-killware-iot</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/interview-with-a-crypto-scam-investment-spammer</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/iran-behind-pro-trump-hit-list-of-u-s-election-officials-fbi-says</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/irans-lyceum-threat-group-active-against-telcos-isps-clopp-hits-unpatched</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/irs-warns-parents-of-child-tax-credit-scams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/irs-workload-gives-scammers-opportunities-to-cheat-taxpayers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/is-the-uk-getting-better-at-identifying-scams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/is-your-security-organization-ripe-for-a-reorg</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/israeli-hostages-family-members-are-being-threatened-by-suspicious-texts</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/it-pros-automation-may-take-over-jobs-but-it-wont-replace-the-human-touch</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/it-world-canada-cyber-security-today-sept-16-2022</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/it-would-be-very-easy-for-children-to-venture-onto-an-unsafe-website-domain</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/jesse-jones-scammers-using-new-tool-to-steal-online-passwords</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/john-conwell-techstrong-tv</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/joint-fbi-cisa-nsa-warning-on-russian-threats-to-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/justice-department-and-microsoft-target-russian-phishing-campaigns-with-domain-seizures</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/kawasaki-heavy-industries-a-partner-of-defense-companies-and-agencies-repor</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/keep-your-eyes-peeled-for-scams-on-amazon-prime-day</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/key-characteristics-of-malicious-domains-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/kimsuky-phishing-operations-putting-in-work</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/krebsonsecurity-phishers-target-aviation-execs</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/krebsonsecurity-threatened-with-defamation-lawsuit-over-fake-radaris-ceo</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/large-scale-phishing-campaign-targets-defense-and-aerospace-companies</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/law-enforcement-operation-takes-down-labhost-phishing-service-uk-university-students-among-suspects-arrested</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/leakedsource-owner-quit-ashley-madison-a-month-before-2015-hack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/legitimate-tools-spoofed-by-infostealing-chrome-extensions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/letting-neurodiverse-talent-shine-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/leverage-threatstream-and-domaintools-covid-19-threat-list</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/license-to-fraud-scammers-are-stealing-identities-using-personal-info-from-washington-dol</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/list-of-well-known-web-sites-that-port-scan-their-visitors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/lockbit-may-have-stolen-24-years-of-data-on-canadian-government-employees</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/lockbit-ransomware-claims-tsmc-as-its-latest-victim-demands-70m</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/lockbit-ransomware-threat-persists</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/lockbits-third-party-compromise-of-canadian-government-personnel-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/look-beyond-the-big-5-in-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/low-budget-winter-vivern-apt-awakens-after-2-year-hibernation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/luxury-brands-cheap-domains-why-retailers-are-losing-the-fight</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/lynx-on-the-prowl-targeting-smbs-with-double-extortion-tactics</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/major-hack-hits-energy-companies-u-s-agencies</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/majority-of-consumers-aware-of-online-publishing-scams-yet-still-may-fall</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/majority-of-organizations-are-in-the-dark-regarding-daily-network-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/making-sense-of-the-2023-ransomware-landscape</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/malicious-chrome-extensions-pose-as-ai-tools-to-trick-users-into-installing-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/malicious-coronavirus-victim-tracking-app-demands-ransom-payment-from-andro</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/malicious-covid-19-android-app-is-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/malicious-covid-19-tracker-app-locks-phones-and-demands-100-in-bitcoin</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/malicious-covid-19-tracking-app-infects-your-phone-with-ransomware-update-d</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/malicious-javascript-injection-powers-new-magecart-payment-skimming-attack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/malicious-use-of-ssl-increases-as-attackers-deploy-hidden-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/malware-as-a-service-pioneers-the-manipulaters-return-from-10-years-underground</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/malware-campaign-targets-telegram-desktop-application</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/managed-security-services-provider-mssp-market-news-08-november-2022</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/managing-the-emotional-toll-cybersecurity-incidents-can-take-on-your-team</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/manipulation-by-disinformation-how-elections-are-swayed</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/many-security-shops-made-the-grade-in-2020-despite-obstacles</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/many-supposedly-grassroots-reopen-sites-are-tied-to-one-pro-gun-lobbyist</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/mapping-russian-ransomware-networks-a-strategic-guide-to-understanding-hidden-criminal-alliances-and-operator-migration-patterns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/massive-hacks-linked-to-russia-china-exploited-u-s-internet-security-gap-a</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/massive-hacks-linked-to-russia-china-exploited-u-s-internet-security-gap-w</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/massive-phishing-campaign-targeting-ukraine-defense-contractors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/microsoft-concludes-internal-investigation-into-solorigate-breach</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/microsoft-defender-reportedly-tagging-zoom-and-google-as-malicious-sites</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/microsoft-doj-dismantle-russian-hacker-group-star-blizzard</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/microsoft-exchange-exploit-a-possible-factor-in-50m-ransomware-attack-on-ac</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/microsoft-spots-more-than-40-organizations-hit-by-solarwinds-hack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/microsoft-warns-of-massive-covid19-rat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/microsoft-windows-warning-do-not-install-these-apps-on-your-pc</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/money-moves-november-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/montreals-societe-de-transport-de-montreal-stm-public-transport-system-hit</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/more-than-half-of-summer-travelers-are-unaware-of-phishing-scams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/mssp-market-news-darktrace-barracuda-manageengine</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/mssps-msps-step-up-to-defend-water-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/mysterious-company-with-government-ties-plays-key-internet-role</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/mysterious-new-windows-malware-continues-to-vex-researchers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/navigating-cyber-complexity-in-a-risky-world-lessons-learned-from-wef</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ncsc-sounds-alarm-over-russia-backed-hacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/netsupport-rat-spread-via-bogus-gitcode-docusign-sites</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-android-ransomware-poses-as-coronavirus-tracking-app</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-challenges-new-skills</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-chenlun-sinkinto01-ttps-development-to-use-amazon-usps-lures-in-smishing-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-cloud-atlas-activity-reported-the-cyberwire-daily-briefings</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-malware-is-beeping-good-at-evading-detection-scandinavian-airlines-cyberattack-leads-to-customer-data-leak-oakland-update</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-multi-stage-malware-campaign-uses-fake-captchas-to-deliver-netsupport-rat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-ransomware-that-took-advantage-of-an-android-app-to-install-an-attack-o</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-ransomware-threats-leave-victims-scrambling-to-know-how-to-respond</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-report-analyzes-nearly-400000-malicious-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-report-identifies-malicious-activity-hotspots</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-research-from-sans-and-domaintools-reveals-shift-towards-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-russian-backed-gamaredons-spyware-variants-targeting-ukrainian-authorities</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-self-spreading-golang-worm-dropping-xmrig-miner-on-servers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-sms-phishing-campaign-impersonating-the-us-postal-service</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-spynote-android-malware-campaign-mimics-google-play-to-deliver-stealthy-rat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-study-reveals-rise-of-threat-hunting-to-combat-wave-of-cybersecurity-th</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-study-suggests-security-automation-will-cause-dramatic-improvements-but</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-survey-examines-the-impact-of-solarwinds-breach-on-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/new-york-launches-nations-first-vaccine-passports-others-are-working-on-si</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/newly-registered-domain-name-tracking-made-easier-with-domaintools-new-feed</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/news-insights-fbi-nsa-cisa-issue-advisory-on-russian-cyber-threat-to-us-cri</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/nextgov-iranian-hackers-psychological-war-crime</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/nigeria-romania-ranked-among-top-cybercrime-havens</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/nissan-oceania-data-breach-impacts-100000-individuals-in-australia-and-new-zealand</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/nissan-ransomware-attack-affects-over-100000</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/north-dimension-ftx-bankman-fried-rcna63175</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/notorious-fake-news-purveyor-pushing-coronavirus-misinformation-from-macedo</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/novel-multi-version-countloader-malware-loader-advances-russian-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/nso-group-impersonated-facebook-to-help-clients-hack-targets</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/nso-group-impersonates-facebook-security-team-to-spread-spyware-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/octo2-malware-uses-fake-nordvpn-chrome-apps-to-infect-android-devices</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/offshoring-trolling-covid-19s-implications-for-security-out-of-band-micro</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ohio-senator-lashes-govt-over-accountability-for-solarwinds-attack-featured</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/old-excel-macros-still-supporting-large-scale-maldoc-campaigns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/online-scammers-are-rushing-to-exploit-people-desperate-to-get-the-covid-19</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/online-scammers-target-vulnerable-internet-users-during-coronavirus-outbrea</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/opsec-failure-exposes-coquetttes-malware-campaigns-on-bulletproof-hosting-servers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/opsec-lapse-reveals-hub-for-amateur-cybercriminals</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/optimizing-security-in-the-work-from-home-era</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/orange-europes-fourth-largest-mobile-operator-confirms-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/over-100-malicious-chrome-extensions-detected-disguised-as-ai-tools-vpns-and-crypto-utilities</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/over-100-malicious-chrome-extensions-exploiting-users-to-steal-login-credentials-and-execute-remote-code</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/over-40-malicious-chrome-extensions-impersonate-popular-brands-to-steal-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/over-90-of-cyber-security-experts-believe-the-uks-political-landscape</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/pakistan-arrests-21-in-heartsender-malware-service</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/pakistan-based-cybercrime-network-dismantled-by-us-dutch-authorities</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/pandemic-profiteering-us-cracks-down-on-scammers-price-gouging</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/parlers-new-partner-has-ties-to-the-russian-government-seattle-times</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/password-found-to-rescue-victims-of-malicious-covid-19-tracker-app</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/patient-portals-down-ransomware-up</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/pfizer-biontechs-covid19-vaccine-for-sale-on-the-dark-web</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/phisher-jailed-after-tricking-pentagon-out-of-24-million</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/phishers-spoof-usps-12-other-natl-postal-services</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/phishers-spoof-usps-krebs-on-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/phishing-campaign-seeks-to-siphon-ukraine-war-intelligence-from-defense-contractors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/phishing-campaign-tied-to-russia-aligned-cyberespionage</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/phishing-campaign-tied-to-russia-aligned-cyberespionage-govinfo-security</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/phishing-goes-viral-covid-19-themes-in-cybercrime</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/phishing-in-the-time-of-covid-19-how-to-recognize-malicious-coronavirus-phi</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/phishing-scam-nets-23-5-million-from-dod-california-man-arrested-siphoning</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/phishing-sites-targeting-scammers-and-thieves</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/phishing-smishing-surge-targets-us-postal-service</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/phishing-threats-attempt-to-hook-new-government-victims</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/pig-butchering-and-financial-advisor-impersonation-scams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/playbook-fridays-domaintools-iris-investigate-monitor</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/podcast-us-presidential-transition-countering-cyber-risks-and-surface-navy</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/poisonseed-threat-actor-registers-new-domains-to-target-enterprise-credentials</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/poisonseed-threat-actor-registers-new-domains-to-target-enterprise-credentials-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/poisonseed-threat-actor-strengthens-credential-theft-operations-with-new-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/poisonseed-threat-actor-strengthens-credential-theft-operations-with-new-domains-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ponemon-institute-and-domaintools-report-security-automation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ponemon-institute-report-finds-security-automation-continues-to-evolve</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/possible-government-shutdown-has-cybersecurity-experts-worried</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/predictions-on-the-2021-cybersecurity-landscape</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/preemptive-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/pro-russia-cyber-gang-winter-vivern-puts-us-euro-lawmakers-in-line-of-fire</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/pro-russia-group-exploits-roundcube-zero-day-in-attacks-on-european-government-emails</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/pro-russian-winter-vivern-apt-targets-governments-and-telecom-firm</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/promising-jobs-at-the-u-s-postal-service-us-job-services-leaks-customer-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/protest-website-tied-to-extremist-linked-activists-digital-marketing-firm</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/qr-codes-can-be-used-to-steal-data-money-and-download-malware-fbi-warns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/questions-and-tips-to-guide-website-investigations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/quick-manually-patch-this-zimbra-bug-thats-under-attack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ransomhub-says-change-healthcare-data-now-up-for-sale</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ransomware-attack-shuts-down-kansas-city-systems</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ransomware-attacks-against-healthcare-organizations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ransomware-gang-babuk-claims-dcs-metropolitan-police-was-last-caper-then-go</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ransomware-gangs-are-starting-to-hack-vulnerable-microsoft-exchange-servers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ransomware-gangs-now-have-industrial-targets-in-their-sights-that-raises-t</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ransomware-group-claims-it-dumped-source-code-of-cyberpunk-2077</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ransomware-red-flags-7-signs-youre-about-to-get-hit</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ransomware-strikes-wichita-services-disrupted</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/read-link-carefully-scammers-scoop-up-misspelled-crypto-urls-to-rob-wallet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/read-that-link-carefully</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/recruiting-and-nurturing-neurodivergent-professionals-in-cybersecurity-guest-ian-campbell</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/red-cross-hack-linked-to-iranian-influence-operation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/release-of-new-covid-19-specific-dynamic-blacklist-powered-by-domaintools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/renewable-energy-microgrids-face-growing-cyber-threats-fbi</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/reopen-domain-name-owners-include-a-gun-activist-a-good-samaritan-and-poten</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/repeat-identity-thief-buys-car-motorhome-on-stolen-credit</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/report-android-ransomware-is-posing-as-a-coronavirus-tracking-app</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/report-domains-promoting-resistance-to-covid-19-orders-tied-to-one-owner</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/report-examines-hotspots-across-the-internet-in-tlds-registration-patterns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/research-on-e-commerce-crypto-scams-reveals-insidious-scams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/researcher-says-florida-water-plant-attack-was-aimmature-rushed-or-unintent</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/researchers-at-domaintools-discovered-ransomware-hidden-in-some-covid-19-ap</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/researchers-discover-how-far-right-coronavirus-protest-websites-are-organiz</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/researchers-expose-hidden-alliances-between-ransomware-groups</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/researchers-find-dozens-of-fake-e-zpass-toll-websites-after-fbi-warning</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/researchers-raise-alarms-over-indonesian-phishing-as-a-service-group</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/researchers-uncover-hidden-connections-between-ransomware-groups-and-relationships-between-them</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/revil-ransomware-gang-offers-1-million-as-part-of-recruitment-drive</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/revil-ransomware-operators-claim-group-is-ending-activity-again-victim-leak</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/revil-tastes-its-own-medicine-and-doesnt-taste-good-revil-site-hacked</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/revils-ransomware-success-formula-constant-innovation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/rising-firebrick-ostrich-bec-group-launches-industrial-scale-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-biz-hackers-breach-norway-dam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-biz-news-china-says-the-us-is-framing-other-countries-for-espionage-operations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-biz-news-russia-arrests-cryptex-founder-a-week-after-us-sanctions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-biz-news-two-arrests-in-operation-magnus</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-biz-news-us-treasury-piles-more-sanctions-on-intellexa</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-bulletin-ai-slopsquatting-its-coming</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-bulletin-android-looks-set-to-get-its-own-lockdown-mode</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-bulletin-apt-report-no-just-a-phishing-test</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-bulletin-china-says-taiwans-military-is-behind-poisonivy-apt</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-bulletin-cyberattack-hits-ukraines-state-railway</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-bulletin-dutch-intelligence-agencies-discover-a-new-russian-apt</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-bulletin-eu-launches-private-dns-service</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-bulletin-eu-sanctions-more-russian-disinformation-peddlers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-bulletin-germanys-bsi-sinkholes-badbox-malware-traffic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-bulletin-hackers-sabotage-iranian-ships-at-sea-again</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-bulletin-most-uk-school-hacks-are-caused-by-their-own-students</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/risky-bulletin-sentinelone-avoids-a-chinese-apt-hack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/robinhood-market-hit-with-data-breach</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/robinhood-trading-platform-data-breach-hits-7m-customers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/round-2-change-healthcare-targeted-in-second-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/roundtable-cisas-prominent-role-sharing-threat-intel-could-get-choked-off-this-weekend</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/russia-aims-cyber-operations-at-summer-olympics</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/russian-disinformation-campaigns-exploit-domain-registrars-and-ai-to-target-western-audiences</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/russian-hackers-targeted-us-nuclear-scientists</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/sans-survey-reveals-lack-of-skilled-personnel-as-the-biggest-barrier</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/sba-gets-60-billion-disaster-loan-boost-confirms-back-button-data-breach</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/scam-funeral-streaming-groups-thrive-on-facebook</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/scammers-posing-as-bioscience-firms-target-student-job-hunters</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/scammers-posing-as-hmrc-launch-1-5m-attacks-in-two-years</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/scammers-spoof-maga-hat-vendors-to-steal-2-3m-from-republicans</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/scammers-use-fake-coronavirus-apps-to-target-individuals</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/scams-and-malicious-domains-emerging-from-breaking-news</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/seattle-business-magazine-honors-washingtons-100-best-companies-to-work-for</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/seattle-doordasher-falls-victim-to-sophisticated-hack-loses-800-in-minutes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/sec-proposes-new-rules-for-public-companies-to-report-breaches-in-four-days</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/second-cyber-extortion-attack-on-change-healthcare-follows-rumored-22-million-payment-may-involve-former-blackcat-alphv-hackers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/securing-the-election-of-a-generation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-a-balance-between-humans-and-automation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-affairs-malware-newsletter-round-41</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-affairs-malware-newsletter-round-48</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-alert-this-ransomware-is-posing-as-a-coronavirus-tracking-app</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-automation-is-changing-hiring-trends</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-breaches-at-a-standstill-but-covid-related-attacks-increase</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-experts-on-texas-school-district-loses-2-3m-in-phishing-scam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-experts-warn-about-scanning-qr-codes-with-your-smart-device</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-leaders-respond-to-disruption-of-labhost-a-fraud-website</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-professionals-and-over-50s-triumph-in-phishing-quiz</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-professionals-anticipate-automation-will-reduce-it-security-headco</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-professionals-mourn-the-loss-of-whois-data-post-gdpr-domaintools-s</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-pros-anticipate-automation-will-reduce-it-security-headcount-but-n</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-researchers-say-the-reopen-america-campaign-is-being-astroturfed</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/security-rift-chinas-censors</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/securityweeks-cyber-insights-2025</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/shady-network-of-fake-mossad-job-sites-targets-iranian-spies</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/silobreaker-integration-with-domaintools-enriches-threat-intelligence-context-and-visibility</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/silverfox-apt-group-advanced-threat-analysis-and-strategic-recommendations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/sipping-from-the-coronavirus-domain-firehose</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/sisense-breach-highlights-rise-in-major-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/sketchy-domains-try-to-trick-ukraine-supporters-out-of-would-be-donations</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/smashing-security-162-robocalls-health-hacks-and-facial-recognition-fears</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/snatch-ransom-group-exposes-visitor-ip-addresses</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/so-called-pig-butchering-scams-can-cost-victims-millions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/solarleaks-site-claims-to-offer-attack-victims-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/solarwinds-cyber-attack-how-worried-should-i-be-and-what-do-i-do-now</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/solarwinds-likely-hacked-at-least-one-year-before-breach-discovery</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/solarwinds-spurs-investment-in-threat-hunting-supplier-vetting</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/solarwinds-the-hunt-to-figure-out-who-was-breached</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/solarwinds-threat-actor-gains-access-to-mimecasts-production-grid-environme</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/solutions-review-cyber-news-roundup</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/sonicwalls-dog-food-bites</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/sos-bitesize-the-increase-in-hmrc-smishing-with-chad-anderson-of-domaintool</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/spear-phishing-campaign-exploits-glitch-platform-to-steal-credentials</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/spooky-spam-scary-scams-halloween-threats-rise</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/spynote-android-malware-resurfaces-in-campaign-using-spoofed-app-install-pages</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/spynote-badbazaar-moonshine-malware-target-android-and-ios-users-via-fake-apps</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/spyware-and-national-policy-israel-and-the-us-data-breach-at-the-toronto</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/stark-industries-solutions-an-iron-hammer-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/state-aligned-actors-targeting-smbs-globally</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/state-department-offers-10-million-reward-for-identification-of-conti-ranso</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/stimulus-scam-alert-these-fake-child-tax-credit-websites-will-steal-your-id</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/stimulus-scam-warning-over-fake-child-tax-credit-websites-that-will-steal-y</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/subdomailing-expose-massive-domain-hijacking-campaign-used-for-ad-fraud-malvertising-phishing-emails</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/sunbust-avoided-indicators-of-compromise-with-solarwinds-hack-but-left-brea</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/survey-consumers-are-willing-to-overlook-security-flaws-for-cyber-monday</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/suspected-chinese-spies-cover-tracks-in-efforts-to-breach-vietnamese-govern</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/talent-shortage-in-cyber-security-to-continue-say-cisos</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/tanglebot-malware-reaches-deep-into-android-device-functions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/tech-community-faces-crisis-head-on</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/tech-companies-are-selling-domains-suggesting-illegal-sales-of-guns-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/tech-moves-madrona-grows-investment-team-microvision-axon-add-board-members</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ten-years-later-new-clues-in-the-target-breach</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/textbook-publishers-sue-shopify-claiming-it-harbours-pirates</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/thanksgiving-week-ransomware-attack-hits-ardent-health-hospitals-in-6-states</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-20-hottest-cybersecurity-products-at-black-hat-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-20-hottest-cybersecurity-products-at-black-hat-21</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-alphv-blackcat-takedown-shuffle</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cf-list-20-top-threat-intelligence-providers-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-changing-face-of-cybercrime-in-a-recession</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cybersecurity-202-senate-panel-delves-into-solarwinds-hack</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cybersecurity-202-the-federal-government-may-be-about-to-engage-in-the</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-for-10-11-24</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-for-10-29-24</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-issue-133</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-issue-138</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-issue-160</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-issue-177</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-issue-212</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-issue-230</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-issue-242</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-v12-issue-100</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-v12-issue-111</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-v12-issue-120</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-v12-issue-133</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-v12-issue-201</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-v12-issue-233</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-v12-issue-41</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-v12-issue-47</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-cyberwire-daily-briefing-v12-issue-9</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-great-security-survivor-experts-on-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-impact-of-security-automation-on-hiring-trends</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-internet-archive-is-being-used-as-a-disinformation-mule</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-internet-is-drowning-in-covid-19-related-malware-and-phishing-scams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-manipulaters-improve-phishing-still-fail-at-opsec</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-power-of-process-in-creating-a-successful-security-posture</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-rise-in-new-domain-names-leveraging-coronavirus-and-covid-19</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-solarwinds-hackers-shared-tricks-with-a-notorious-russian-spy-group</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-spine-collector</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-supply-chain-that-keeps-tech-flowing-to-russia</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-top-25-cfos-of-washington-for-2024</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-ultimate-guide-to-cybersecurity-planning-for-businesses</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-underbelly-of-covid-19-malware-and-ransomware-ramp-up</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-underground-market-for-vaccines</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/the-wave-of-coronavirus-cyber-scams</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/these-anti-quarantine-websites-are-fakes-heres-what-theyre-really-after</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/these-dangerous-fake-google-chrome-extensions-spoof-vpns-and-youtube</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/third-annual-cybersecurity-report-card</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/third-party-data-breach-hits-bank-of-america-at-least-57000-records-of-sensitive-personal-information-exposed</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/third-party-data-breach-of-contractors-exposed-personal-information-of-canadian-government-employees-dating-back-25-years</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/this-coronavirus-android-malware-will-lock-you-out-of-your-phone</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/this-hacker-university-offers-cybercrime-degrees-on-the-dark-web-for-125</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/this-hacker-university-offers-dark-web-cybercrime-degrees-for-125</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/this-ransomware-comes-with-its-own-affiliate-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/this-trojan-disguises-as-google-chrome-or-nordvpn-to-wipe-out-your-accounts</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/threat-actors-are-abusing-glitch-platforms</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/threat-actors-are-finding-new-ways-to-sneak-spam-past-filters</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/threat-actors-exploit-prove-you-are-human-scheme-to-deliver-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/threat-actors-put-1-trillion-shopping-season-in-their-sights</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/threat-actors-shopping-around-domain-fraud-brand-impersonation-and-ponzi-schemes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/threat-monitoring-newly-created-ukraine-related-domain-names</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/threatconnect-research-roundup-threat-intel-update-april-8th-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/time-to-get-strict-with-dmarc</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/tldr-sec-289-ai-powered-fuzzing-incentives-in-security-malware-in-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/todays-mssp-mdr-xdr-and-cybersecurity-market-news</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/top-salary-for-cybercriminals-can-exceed-1m</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/toxic-permissions-leave-aws-s3-buckets-vulnerable-to-ransomware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/tracing-the-ransomware-family-tree</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/tracking-elusive-cybercriminals-through-domain-analysis</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/trick-or-threat-the-monsters-lurking-behind-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/trolley-talk-rsa-2020-edition-scs-third-annual-cable-car-chats-video</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/trump-cyber-eo-reverses-some-parts-of-biden-obama-orders</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/twitter-hack-is-a-reminder-of-the-dangers-of-unfettered-employee-access</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/twitters-clumsy-pivot-to-x-com-is-a-gift-to-phishers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/typosquat-campaign-targeting-android-windows-users-now-counts-600-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/u-s-security-agencies-warn-about-russian-threat-gangs-amid-ukraine-tension</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ublock-origin-ad-blocker-now-blocks-port-scans-on-most-sites</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ukraine-impersonation-scam-the-cyberwire</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ukraine-impersonation-scam-the-cyberwire-stories</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/ukraine-russia-cyber-battles-tip-over-into-the-real-world</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/uks-nca-sanctions-members-of-the-evil-corp-gang</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/under-increasing-federal-scrutiny-blackcat-ransomware-gang-pulls-exit-scam-on-its-way-out</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/update-on-guess-data-breach-covid-relief-phishbait-state-privacy-legislat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/update-on-red-curl-ta406s-high-2021-optempo-ephemeral-payloads-in-a-spear</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/url-rendering-trick-enabled-whatsapp-signal-imessage-phishing</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/us-harbors-prolific-malicious-link-shortening-service</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/us-warns-critical-infrastructure-of-russian-state-sponsored-threats</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/us-weakens-disinformation-defenses-as-russia-china-ramp-up</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/use-caution-with-qr-codes-they-can-lead-you-right-to-a-scammer</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/using-biometrics-to-prevent-sim-card-abuse-could-introduce-bigger-problems</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/usps-anchors-snowballing-smishing-campaigns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/usps-other-postal-services-increasingly-exploited-in-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/venomrat-malware-introduces-new-tools-for-password-theft-and-stealthy-access</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/venomrat-spread-via-fake-bitdefender-site</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/verizon-report-analysis-money-not-espionage-at-the-heart-of-cyber-crime-bre</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/vigilance-securitymagazine-domaintools-launches-global-partner-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/vile-on-trumps-enemies-caught-the-fbis-attention</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/vmblog-expert-interview-corin-imai-of-domaintools-details-findings-from-thi</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/vulnerable-u-115</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/vulnerable-u-117</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/vulnerable-u-120</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/warning-as-pfizer-covid-19-vaccine-offered-on-dark-web-for-1000-a-dose</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/warning-malicious-chrome-extensions-found-mimicking-legit-tools</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/warning-millions-of-websites-could-become-insecure-today-heres-how-to-check</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/warning-over-fake-stimulus-scam-sites-that-will-steal-your-identity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/warning-these-tax-credit-scam-websites-could-steal-your-identity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/warning-this-malicious-coronavirus-tracker-will-lock-out-your-phone</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/watch-out-that-antivirus-website-could-be-a-fake-and-infecting-your-pc-with-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/watch-out-that-antivirus-website-could-be-a-fake-and-infecting-your-pc-with-malware-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/watch-out-this-fake-coronavirus-tracking-app-is-a-malware-trap</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/water-sector-lacks-support-to-meet-white-house-cyber-demands</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/water-utility-hack-could-inspire-more-intruders</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/weaponized-words-uyghur-language-software-hijacked-to-deliver-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/web-hacking-service-araneida-tied-to-turkish-it-firm</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/web-owners-ignore-alerts-as-magecart-hits-40-more-sites</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/week-4-2021</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/west-african-bad-actor-impersonates-financial-advisors-to-steal-millions</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/what-a-would-be-mass-poisoning-in-florida-says-about-u-s-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/what-covid-19-can-tell-us-about-the-future-of-disinformation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/what-expert-says-on-hackers-exploited-tor-exit-relays-to-generate-bitcoin</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/what-hacking-attacks-can-teach-us-about-defending-networks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/what-is-tor-everything-you-need-to-know-about-the-anonymity-network</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/what-is-typosquatting-a-simple-but-effective-attack-technique</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/whatsapp-security-warning-for-iphone-users-as-one-click-attack-risk-confirm</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/when-an-online-deal-looks-too-good-to-be-true-it-probably-is</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/when-exploits-go-wild-and-patches-race-the-clock</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/who-and-what-is-behind-the-malware-proxy-service-socksescort</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/who-got-arrested-in-the-raid-on-the-xss-crime-forum</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/who-owns-coronavirus-com-behind-the-lucrative-profiteering-on-website-domai</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/whois-domaintools-first-for-women</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/whois-rdap-and-dns-data</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/whos-behind-the-8base-ransomware-website</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/whos-behind-the-botnet-based-service-bhproxies</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/whos-behind-the-domainnetworks-snail-mail-scam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/whos-behind-the-netwire-remote-access-trojan</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/whos-behind-the-reopen-domain-surge</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/whos-behind-the-web-listings-mail-scam</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/why-covid-19-digital-distancing-is-every-bit-as-vital-as-social-distancing</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/why-malware-crypting-services-deserve-more-scrutiny</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/why-managers-matter-to-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/why-supply-chain-security-blind-spots-put-enterprises-at-risk-qa</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/why-the-industry-needs-to-step-up-action-on-malicious-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/why-these-tech-teams-turn-to-python-for-major-projects</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/widespread-vishing-effort-impersonates-cisa-staff</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/winter-vivern-apt-hackers-use-fake-antivirus-scans-to-install-malware</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/winter-vivern-exploits-zero-day-vulnerability-in-roundcube-webmail-servers</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/wired-hackers-finding-ways-hide-malware-in-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/xe-group-exposed-8-years-of-hacking-card-skimming-for-profit</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/yahoo-finance-domaintools-announces-predictive-threat-feeds</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/yahoo-finance-syndicate-domaintools-launches-global-partner-program</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/you-cant-automate-the-entire-cybersecurity-function-yet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/your-screen-resolution-can-stop-malware-heres-how-that-works</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/press/zip-top-level-domains-draw-potential-for-information-leaks</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/2019-ponemon-report-staffing-it-age-automation</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/2019-threat-hunting-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/2022-threat-hunting-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/bang-question-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/bang-question-report-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/baril-ip-mapping</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/basic-multilingual-plane</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/carriage-return</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/comparing-images-such-as-screenshots-using-perceptual-hashes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/cybelangel-farsight-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/def-con-subdomain-enumeration</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/developing-threat-hunting-program-checklist</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/dns-network-traffic-volumes-during-the-2020-pandemic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/dnsdb-flexible-search-intro</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/dnsdbq-manual-jan-2020</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/domain-risk-score-technical-brief</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/domains-that-begin-with-a-digit</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/domaintools-for-splunk-4-app-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/domaintools-for-splunk-5-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/domaintools-iris-detect-user-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/domaintools-iris-qs-guide</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/domaintools-maltego-solarwinds-case-study</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/domaintools-reputation-scoring</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/dt-report-supplement-malicious-domain-affix-patterns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/ema-security-megatrends-2018</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/examples-of-chenlun-phishes</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/formulating-a-robust-pivoting-methodology</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/gas-laws-of-tls</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/how-domain-intelligence-and-passive-dns-create-a-fuller-domain-profile</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/importing-custom-blocklists-into-popular-security-controls</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/ipv6-deployment-on-the-internet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/iris-report-unc-1151-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/joe-st-sauver-dealing-with-short-search-terms</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/passive-dns-architecture</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/passive-dns-data-in-iris</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/rolling-yer-own-asn1</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/russells-paradox</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/sans-threat-hunting-2018-survey-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/scala-demo-whitepaper</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/scala-demo-whitepaper-2</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/the-domaintools-report-2015</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/the-heavyweight</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/valuable-datasets-to-analyze-network-infrastructure-cheat-sheet</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/working-with-the-sie-batch-api-a-command-line-client-in-ruby-perl-python-and-c</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/year-of-pandemic-passive-dns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/your-hostname-is-my-hostname</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/files/zero-based-indexing</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/domaintools-reports/domain-blooms-new-method-of-detecting-trending-bad-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/domaintools-reports/domaintools-report-fall-2021-edition</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/domaintools-reports/inaugural-domain-intelligence-report</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/domaintools-reports/the-domaintools-report-2015-special-edition</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/domaintools-reports/the-domaintools-report-spring-2017-edition</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/domaintools-reports/the-domaintools-report-spring-2023-edition</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/domaintools-reports/the-domaintools-report-spring-2024-edition</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/domaintools-reports/the-domaintools-report-supplement-malicious-domain-affix-patterns</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/domaintools-reports/the-domaintools-report-supplement-new-patterns-in-phishy-domains</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events/afcea-insa-intel-summit</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events/black-hat</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events/black-hat-2025</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events/black-hat-asia</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events/black-hat-usa</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events/bsides-las-vegas</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events/cyberwarcon</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events/first</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events/incyber-forum-fic</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events/rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events/sof-week</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/events/technet-indo-pacific</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/event-thank-you/black-hat-asia</loc>
    </url>
    <url>
        <loc>https://www.domaintools.com/event-thank-you/rsac</loc>
    </url>
</urlset>