pastebin

DomainTools
  1.  
  2. <rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" version="2.0">
  3. <channel>
  4. <title>
  5. <![CDATA[ DomainTools ]]>
  6. </title>
  7. <atom:link href="../resources/blog/feed" rel="self" type="application/rss+xml"/>
  8. <link>).../resources/blog</link>
  9. <description>
  10. Innovative, Practical Advice to Improve your Cybersecurity Posture
  11. </description>
  12. <language>en-US</language>
  13. <item>
  14. <title>
  15. <![CDATA[ What is Threat Hunting? ]]>
  16. </title>
  17. <link>
  18. ../resources/blog/what-is-threat-hunting
  19. </link>
  20. <pubDate>Thu, 21 May 2020 08:00:00 -0700</pubDate>
  21. <dc:creator>1258</dc:creator>
  22. <category>General Infosec</category>
  23. <guid isPermaLink="false">
  24. .../resources/blog/what-is-threat-hunting
  25. </guid>
  26. <description>
  27. <![CDATA[
  28. Cybercriminals today have more tactics than ever before to avoid defense measures. Threat Hunting helps defenders get ahead of cyberattacks in order to prevent or minimize damage to your organization before they occur.
  29. ]]>
  30. </description>
  31. </item>
  32. <item>
  33. <title>
  34. <![CDATA[ Building your IR Plan Step-by-Step ]]>
  35. </title>
  36. <link>
  37.  ./resources/blog/building-your-ir-plan-step-by-step
  38. </link>
  39. <pubDate>Thu, 14 May 2020 08:00:00 -0700</pubDate>
  40. <dc:creator>1258</dc:creator>
  41. <category>General Infosec</category>
  42. <guid isPermaLink="false">
  43. ../resources/blog/building-your-ir-plan-step-by-step
  44. </guid>
  45. <description>
  46. <![CDATA[
  47. Now that the team is in place, it’s time to build out your IR plan. In blog 3 in this series, we go in detail of the six steps of Incident Response. Remember, a strong IR plan helps you to both prepare and prevent security incidents.
  48. ]]>
  49. </description>
  50. </item>
  51. <item>
  52. <title>
  53. <![CDATA[
  54. How to Make DomainTools’ Threat Intelligence Actionable in a Threat Intelligence Firewall Solution
  55. ]]>
  56. </title>
  57. <link>
  58. ../resources/blog/how-to-make-domaintools-threat-intelligence-actionable-in-a-threat-intelligence-firewall-solution
  59. </link>
  60. <pubDate>Tue, 12 May 2020 08:00:00 -0700</pubDate>
  61. <dc:creator>1308</dc:creator>
  62. <category>General Infosec</category>
  63. <guid isPermaLink="false">
  64. .../resources/blog/how-to-make-domaintools-threat-intelligence-actionable-in-a-threat-intelligence-firewall-solution
  65. </guid>
  66. <description>
  67. <![CDATA[
  68. The Next Generation Firewall solution is the first line of network defense but as threats have evolved and increased in volume, a new technology has emerged to work in tandem with the firewall, the Threat Intelligence Firewall.
  69. ]]>
  70. </description>
  71. </item>
  72. <item>
  73. <title>
  74. <![CDATA[ Keep your IR on the Ball ]]>
  75. </title>
  76. <link>
  77. .../resources/blog/keep-your-ir-on-the-ball
  78. </link>
  79. <pubDate>Thu, 07 May 2020 08:00:00 -0700</pubDate>
  80. <dc:creator>1258</dc:creator>
  81. <category>General Infosec</category>
  82. <guid isPermaLink="false">
  83. .../resources/blog/keep-your-ir-on-the-ball
  84. </guid>
  85. <description>
  86. <![CDATA[
  87. Even with the myriad of security tools we have at our disposal today, cybercriminals are still able to penetrate our networks. Is it really necessary to have a Cyber Incident Response Plan in place?
  88. ]]>
  89. </description>
  90. </item>
  91. <item>
  92. <title>
  93. <![CDATA[
  94. The new “Hotness” at DomainTools, Introducing Domain Hotlist
  95. ]]>
  96. </title>
  97. <link>
  98. .../resources/blog/the-new-hotness-at-domaintools-introducing-domain-hotlist
  99. </link>
  100. <pubDate>Thu, 30 Apr 2020 00:01:00 -0700</pubDate>
  101. <dc:creator>960</dc:creator>
  102. <category>Product Updates</category>
  103. <guid isPermaLink="false">
  104. ../resources/blog/the-new-hotness-at-domaintools-introducing-domain-hotlist
  105. </guid>
  106. <description>
  107. <![CDATA[
  108. We are proud to announce Domain Hotlist, a predictive, prioritized, and easily consumable block list that identifies active, high-risk domains—empowering organizations to proactively guard against relevant, emerging threats.
  109. ]]>
  110. </description>
  111. </item>
  112. <item>
  113. <title>
  114. <![CDATA[ What is a Cyber Incident Response Plan? ]]>
  115. </title>
  116. <link>
  117. ../resources/blog/what-is-a-cyber-incident-response-plan
  118. </link>
  119. <pubDate>Thu, 30 Apr 2020 00:00:00 -0700</pubDate>
  120. <dc:creator>1258</dc:creator>
  121. <category>General Infosec</category>
  122. <guid isPermaLink="false">
  123. .../resources/blog/what-is-a-cyber-incident-response-plan
  124. </guid>
  125. <description>
  126. <![CDATA[
  127. In part 1 of this 3-part blog series, we’ll delve into Cyber Incident Response Planning and how to address and manage the repercussions of a cyberattack or incident.
  128. ]]>
  129. </description>
  130. </item>
  131. <item>
  132. <title>
  133. <![CDATA[
  134. Catching Cybercriminals Exploiting the Pandemic Follow Up
  135. ]]>
  136. </title>
  137. <link>
  138. ../resources/blog/catching-cybercriminals-exploiting-the-pandemic-follow-up
  139. </link>
  140. <pubDate>Wed, 29 Apr 2020 08:00:00 -0700</pubDate>
  141. <dc:creator>939</dc:creator>
  142. <category>DomainTools Research</category>
  143. <guid isPermaLink="false">
  144. .../resources/blog/catching-cybercriminals-exploiting-the-pandemic-follow-up
  145. </guid>
  146. <description>
  147. <![CDATA[
  148. Read additional insights from The DomainTools Security Research Team's recent presentation on CovidLock including results from participant polls and supplemental Q&A.
  149. ]]>
  150. </description>
  151. </item>
  152. <item>
  153. <title>
  154. <![CDATA[ Reopen Domains: Shut the Front Dorr ]]>
  155. </title>
  156. <link>
  157. .../resources/blog/reopen-domains-shut-the-front-dorr
  158. </link>
  159. <pubDate>Fri, 24 Apr 2020 00:00:00 -0700</pubDate>
  160. <dc:creator>949</dc:creator>
  161. <category>DomainTools Research</category>
  162. <guid isPermaLink="false">
  163. .../resources/blog/reopen-domains-shut-the-front-dorr
  164. </guid>
  165. <description>
  166. <![CDATA[
  167. Learn how Senior Security Researcher, Chad Anderson, identified coordinated astroturfing when he came across a reddit comment with a number of suspect domains.
  168. ]]>
  169. </description>
  170. </item>
  171. <item>
  172. <title>
  173. <![CDATA[
  174. Free COVID-19 Threat List - Domain Risk Assessments for Coronavirus Threats
  175. ]]>
  176. </title>
  177. <link>
  178. .../resources/blog/free-covid-19-threat-list-domain-risk-assessments-for-coronavirus-threats
  179. </link>
  180. <pubDate>Thu, 23 Apr 2020 08:04:00 -0700</pubDate>
  181. <dc:creator>1240</dc:creator>
  182. <category>Company Updates</category>
  183. <guid isPermaLink="false">
  184. .../resources/blog/free-covid-19-threat-list-domain-risk-assessments-for-coronavirus-threats
  185. </guid>
  186. <description>
  187. <![CDATA[
  188. DomainTools is providing a free, curated list of high-risk COVID-19-related domains to support the community during the Coronavirus crisis. The list will be updated daily and available for CSV download.
  189. ]]>
  190. </description>
  191. </item>
  192. <item>
  193. <title>
  194. <![CDATA[ Think like a Phish ]]>
  195. </title>
  196. <link>
  197. ../resources/blog/think-like-a-phish
  198. </link>
  199. <pubDate>Thu, 23 Apr 2020 08:00:00 -0700</pubDate>
  200. <dc:creator>1258</dc:creator>
  201. <category>General Infosec</category>
  202. <guid isPermaLink="false">
  203. .../resources/blog/think-like-a-phish
  204. </guid>
  205. <description>
  206. <![CDATA[
  207. As stated in our previous blogs, phishing messages rely on social engineering. Security awareness for all employees is key when it comes to protecting against phishing attacks due to the veil of lies within emails/links/attachments.
  208. ]]>
  209. </description>
  210. </item>
  211. </channel>
  212. </rss>
Parsed in 0.045 seconds