<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[DomainTools]]></title><description><![CDATA[DomainTools]]></description><link>https://rss.app</link><image><url>https://rss.app/static/img/icons/rss-app.png</url><title>DomainTools</title><link>https://rss.app</link></image><generator>https://rss.app</generator><lastBuildDate>Fri, 06 Mar 2026 08:13:41 GMT</lastBuildDate><atom:link href="https://rss.app/feeds/_22lRQJMKndkBEjVr.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><item><title><![CDATA[DomainTools ]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/69a1dff15402456c7a3ce814_the-knownsec-leak-domaintools.webp" style="width: 100%;" /><div>Leaked documents from Chinese security firm Knownsec reveal an offensive intelligence contractor serving China's military and security apparatus. Discover how their tools, targeting strategies, and global infrastructure expose the PRC's state-aligned cyberespionage operations.</div></div>]]></description><link>https://www.domaintools.com/white-papers/the-knownsec-leak</link><guid isPermaLink="false">9db4f60853be90199ccbef0d1367eceb</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Tue, 03 Mar 2026 17:17:36 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/69a1dff15402456c7a3ce814_the-knownsec-leak-domaintools.webp"/></item><item><title><![CDATA[DNSDB Scout Updates: Streamlined Interoperability with Iris Investigate]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/69401d99710506f42ab975bc_693c8526c0deb7df21dcea75_need-a-new-pc-buy-one-thats-prebuilt-rather-than-building-one-yourself-Resource-Hero-1030x579.jpeg" style="width: 100%;" /><div>DNSDB Scout v2.5.9 is here — with seamless Iris Investigate pivoting, cleaner copy-paste formatting with bracket defanging, and new export options to streamline your DNS investigations.</div></div>]]></description><link>https://www.domaintools.com/blog/dnsdb-scout-updates-streamlined-interoperability-with-iris-investigate</link><guid isPermaLink="false">c2042e173b6514b6dbc9aca3157b98c7</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Mon, 23 Feb 2026 21:38:02 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/69401d99710506f42ab975bc_693c8526c0deb7df21dcea75_need-a-new-pc-buy-one-thats-prebuilt-rather-than-building-one-yourself-Resource-Hero-1030x579.jpeg"/></item><item><title><![CDATA[Avoiding Activation Scams this Football Season]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/69401da0a8bc2e16eecf5f97_693c852aad9b2d90d1d01cfc_malicious-intent-and-you-a-primer-on-domaintools-risk-scoring-featured-post-image.jpeg" style="width: 100%;" /><div>Cybersecurity researchers have uncovered a growing cluster of fraudulent domains impersonating major streaming networks like ESPN, CBS, and Peacock — targeting sports fans during TV activation. Learn how to spot these scams and protect yourself.</div></div>]]></description><link>https://www.domaintools.com/blog/avoiding-activation-scams-this-football-season</link><guid isPermaLink="false">e18f3f78f8a23749a605d80f852c5c7f</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Mon, 23 Feb 2026 21:38:02 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/69401da0a8bc2e16eecf5f97_693c852aad9b2d90d1d01cfc_malicious-intent-and-you-a-primer-on-domaintools-risk-scoring-featured-post-image.jpeg"/></item><item><title><![CDATA[The Impact of Automation on IT Security Staffing]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019c9528d1f131f29d42c_693c74e916029cf647c0766d_Ponemon-Blog-Feb-2020-Hero-Image-scaled.jpeg" style="width: 100%;" /><div>Learn key insights from a report conducted by the Ponemon Institute, which surveyed 1,027 IT and IT security practitioners in the US and UK who participate in recruiting,</div></div>]]></description><link>https://www.domaintools.com/blog/the-impact-of-automation-on-it-security-staffing</link><guid isPermaLink="false">e91c67533b3fc2b5454e47bf07e09e94</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019c9528d1f131f29d42c_693c74e916029cf647c0766d_Ponemon-Blog-Feb-2020-Hero-Image-scaled.jpeg"/></item><item><title><![CDATA[What's SIE Batch? Why Might I Be Interested In It?]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018acb859cecf4392da78_693c6c51d11228d712e37409_blog-migration-image-12-Resource-Featured.jpeg" style="width: 100%;" /><div>SIE Batch debuts at RSA Conference next week. Learn how SIE Batch makes it easier to consume real-time data for security investigations.</div></div>]]></description><link>https://www.domaintools.com/blog/whats-sie-batch-why-might-i-be-interested-in-it</link><guid isPermaLink="false">dbe7a5599c7cada686a8972b6056906e</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018acb859cecf4392da78_693c6c51d11228d712e37409_blog-migration-image-12-Resource-Featured.jpeg"/></item><item><title><![CDATA[What is a Cyber Incident Response Plan?]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019d5e9949e526d18e428_693c74f4b8a5dcad519160ef_What-is-Cyber-Incident-Response-Plan-Featured.jpeg" style="width: 100%;" /><div>In part 1 of this 3-part blog series, we’ll delve Cyber Incident Response Planning and how to address and manage the repercussions of a cyberattack or incident.</div></div>]]></description><link>https://www.domaintools.com/blog/what-is-a-cyber-incident-response-plan</link><guid isPermaLink="false">6f99e65105ddcfdd77fde0b59c5a45b3</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019d5e9949e526d18e428_693c74f4b8a5dcad519160ef_What-is-Cyber-Incident-Response-Plan-Featured.jpeg"/></item><item><title><![CDATA[Warzone 1.0 RAT Analysis Report]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694008ff3197ab30aeb364db_threat-hunting-hero-1.jpeg" style="width: 100%;" /><div>Drop into the Warzone of RAT Malware. A continually changing field of phishing scams, malware authors, victims, and defense strategies. Read on to find out more.</div></div>]]></description><link>https://www.domaintools.com/blog/warzone-1-0-rat-analysis-report</link><guid isPermaLink="false">b2a4a289147a594a4841009f5c8668b5</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694008ff3197ab30aeb364db_threat-hunting-hero-1.jpeg"/></item><item><title><![CDATA[Why Do Incident Responders and Other Investigators Focus on Particular DNS Record Types?]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a768df562e293421f0_693c6c4fdf172ba74bdd4ef8_blog-migration-image-7-Resource-Featured.jpeg" style="width: 100%;" /><div>Joe St Sauver explains the benefits of searching A, AAAA, CNAME and other DNS records in DNSDB</div></div>]]></description><link>https://www.domaintools.com/blog/why-do-incident-responders-and-other-investigators-focus-on-particular-dns-record-types</link><guid isPermaLink="false">b7cd206b8d842c1b79a5e28dee74beda</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a768df562e293421f0_693c6c4fdf172ba74bdd4ef8_blog-migration-image-7-Resource-Featured.jpeg"/></item><item><title><![CDATA[Using The SIE Batch API to Find Matching Names in Newly Observed Domains (NOD)]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a7047691f6cb08ee88_693c6c4f52408a4fd754bec6_blog-migration-image-6-Resource-Featured.jpeg" style="width: 100%;" /><div>Discover domains of interest in our SIE Channel 212, Newly Observed Domains, to fight scams, misinformation, and more</div></div>]]></description><link>https://www.domaintools.com/blog/using-the-sie-batch-api-to-find-matching-names-in-newly-observed-domains-nod</link><guid isPermaLink="false">0df6ee78900fd9eaafd2512d93e36c0d</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a7047691f6cb08ee88_693c6c4f52408a4fd754bec6_blog-migration-image-6-Resource-Featured.jpeg"/></item><item><title><![CDATA[Improved DomainTools App for Splunk]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019b859924afc056440e7_693c749de0da94903ead185d_splunk_launch_hero_image.jpeg" style="width: 100%;" /><div>Leverage DomainTools APIs for enrichment of domains with Domain Risk Score, domain, DNS, and SSL certificate data to surface malicious activity.</div></div>]]></description><link>https://www.domaintools.com/blog/improved-domaintools-app-for-splunk</link><guid isPermaLink="false">25b1e2368df109e3c8c9dcca7d6142fb</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019b859924afc056440e7_693c749de0da94903ead185d_splunk_launch_hero_image.jpeg"/></item><item><title><![CDATA[‘Tis the Season ]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a7047691f6cb08ee88_693c6c4f52408a4fd754bec6_blog-migration-image-6-Resource-Featured.jpeg" style="width: 100%;" /><div>How DNS abuse plays a key role in online counterfeiting</div></div>]]></description><link>https://www.domaintools.com/blog/tis-the-season-to-counterfeit</link><guid isPermaLink="false">db0210c336168622b71dbd897d1e4f5d</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a7047691f6cb08ee88_693c6c4f52408a4fd754bec6_blog-migration-image-6-Resource-Featured.jpeg"/></item><item><title><![CDATA[The new “Hotness” at DomainTools, Introducing Domain Hotlist]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019d506ac0493b87d6308_693c74f4dacff2c1a8568c82_domain-hotlist-featured-image.jpeg" style="width: 100%;" /><div>We are proud to announce Domain Hotlist, a predictive, prioritized, and easily consumable block list that identifies active, high-risk domains—empowering organizations.</div></div>]]></description><link>https://www.domaintools.com/blog/the-new-hotness-at-domaintools-introducing-domain-hotlist</link><guid isPermaLink="false">9567bced73bdba6b77ec5200147d3d85</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019d506ac0493b87d6308_693c74f4dacff2c1a8568c82_domain-hotlist-featured-image.jpeg"/></item><item><title><![CDATA[DomainTools App for Demisto - Comprehensive, Contextual and Automated Incident Response]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019bc18991876c2aaf913_693c74a3521be684ecea676d_demisto_blog_featured_image.jpeg" style="width: 100%;" /><div>The new Demisto Iris App brings contextual DNS intelligence from DomainTools Iris to Demisto.</div></div>]]></description><link>https://www.domaintools.com/blog/domaintools-app-for-demisto-comprehensive-contextual-and-automated-incident</link><guid isPermaLink="false">317d46925da215dbfd87b786ae1d94c6</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019bc18991876c2aaf913_693c74a3521be684ecea676d_demisto_blog_featured_image.jpeg"/></item><item><title><![CDATA[Newly Registered Domains vs. Newly Observed Domains vs. Newly Active Domains vs. Newly Observed Hostnames vs. DNS Changes: What Does "New" Mean?]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a791860c8b45263d65_693c6c4fae7f6d0b6273eb67_blog-migration-image-5-Resource-Featured.jpeg" style="width: 100%;" /><div>What is the difference between Newly Observed Domains and Newly Registered Domains? Joe St Sauver explains all of this and more in this illuminating article.</div></div>]]></description><link>https://www.domaintools.com/blog/newly-registered-domains-vs-newly-observed-domains-vs-newly-active-domains-vs-newly-observed-hostnames-vs-dns-changes-what-does-new-mean</link><guid isPermaLink="false">2be306d842538f1e93c532ad67053d58</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a791860c8b45263d65_693c6c4fae7f6d0b6273eb67_blog-migration-image-5-Resource-Featured.jpeg"/></item><item><title><![CDATA[New Whitepaper: Working With The SIE Batch API: A Command Line Client In Ruby, Perl, Python and C]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a77ad2d811b014ddda_693c6c4f96b8143e87bdee09_blog-migration-image-3-Resource-Featured.jpeg" style="width: 100%;" /><div>Learn how to use our SIE Batch API in Ruby, Python, Perl and C</div></div>]]></description><link>https://www.domaintools.com/blog/new-whitepaper-working-with-the-sie-batch-api-a-command-line-client-in-ruby-perl-python-and-c</link><guid isPermaLink="false">573e1ec1b8df05816d4eafb9b10b3bbd</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a77ad2d811b014ddda_693c6c4f96b8143e87bdee09_blog-migration-image-3-Resource-Featured.jpeg"/></item><item><title><![CDATA[Phishing: An Old Trick Still Favored by Cybercriminals]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019d41313efad455704f7_693c74f037c54cfd509f8bda_What-is-phishing-Featured.jpeg" style="width: 100%;" /><div>In this 3-part blog series, we’ll delve into phishing and take a look at how you can protect yourself by deploying a strategy of threat protection for your comp</div></div>]]></description><link>https://www.domaintools.com/blog/what-is-phishing</link><guid isPermaLink="false">313595adecb5f005518a3bd466238e2b</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019d41313efad455704f7_693c74f037c54cfd509f8bda_What-is-phishing-Featured.jpeg"/></item><item><title><![CDATA[Iris Investigations At-A-Glance: How to Pivot on Domain Data for Agile and Intelligent Threat Response]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019ba5668caed121bff9b_693c749d76e2aa1737a36e65_iris-investigations-blog-hero-image.jpeg" style="width: 100%;" /><div>Last year, Japanese authorities reported a sophisticated and aggressive phishing campaign using websites spoofing Sagawa Express Co., a major shipping and logistics compa</div></div>]]></description><link>https://www.domaintools.com/blog/iris-investigations-at-a-glance-how-to-pivot-on-domain-data</link><guid isPermaLink="false">954b71ccffc261954f347023df386da8</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019ba5668caed121bff9b_693c749d76e2aa1737a36e65_iris-investigations-blog-hero-image.jpeg"/></item><item><title><![CDATA[Paul Security Weekly #617 on DomainTools Iris]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694008ff3197ab30aeb364db_threat-hunting-hero-1.jpeg" style="width: 100%;" /><div>Paul Asadoorian takes a walk down cyber security lane by investigating a phishing campaign for bank details. From code analyzing, domain identyfying, to blocking domains.</div></div>]]></description><link>https://www.domaintools.com/blog/paul-security-weekly-617-on-domaintools-iris</link><guid isPermaLink="false">f7f0de23e2b454f3db6e2a953620ae2d</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694008ff3197ab30aeb364db_threat-hunting-hero-1.jpeg"/></item><item><title><![CDATA[Spoofing Banks is a Balancing Act]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019c9438234c11202ad31_693c74ae1a8d1ab6e5f17c87_spoofing-banks-is-a-balancing-act-Resource-Featured-Image.jpeg" style="width: 100%;" /><div>Join Senior Security Advisor, Corin Imai, for an investigation into known bad domains. In this blog, learn how to map connected infrastructure to expand from one indica</div></div>]]></description><link>https://www.domaintools.com/blog/spoofing-banks-is-a-balancing-act</link><guid isPermaLink="false">419cd1df6ae16dcd69f1d6a4ae1e5d26</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019c9438234c11202ad31_693c74ae1a8d1ab6e5f17c87_spoofing-banks-is-a-balancing-act-Resource-Featured-Image.jpeg"/></item><item><title><![CDATA[Think like a Phish]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019d4a03e5bf005c6c92f_693c74f05ee58e9b690be140_think-like-a-phish-Featured.jpeg" style="width: 100%;" /><div>As stated in our previous blogs, phishing messages rely on social engineering. Security awareness for all employees is key when it comes to protecting against phishing.</div></div>]]></description><link>https://www.domaintools.com/blog/think-like-a-phish</link><guid isPermaLink="false">7a6f8a194a5d2becc0e1dbe0f8adc7fa</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019d4a03e5bf005c6c92f_693c74f05ee58e9b690be140_think-like-a-phish-Featured.jpeg"/></item><item><title><![CDATA[Tax Scammers: Gone Phishing This Tax Season]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a791860c8b45263d65_693c6c4fae7f6d0b6273eb67_blog-migration-image-5-Resource-Featured.jpeg" style="width: 100%;" /><div>Phishing remains a leading cyberattack during tax season and beyond</div></div>]]></description><link>https://www.domaintools.com/blog/tax-scammers-gone-phishing-this-tax-season</link><guid isPermaLink="false">41436190e621c338c53815c7ed03c332</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a791860c8b45263d65_693c6c4fae7f6d0b6273eb67_blog-migration-image-5-Resource-Featured.jpeg"/></item><item><title><![CDATA[Building your IR Plan Step-by-Step]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019d768df562e2934788c_693c74f5fd71cb1385d32cb2_Building-Your-IR-Plan-Featured.jpeg" style="width: 100%;" /><div>Now that the team is in place, it’s time to build out your IR plan. Remember, a strong IR plan helps you to both prepare and prevent security incidents.</div></div>]]></description><link>https://www.domaintools.com/blog/building-your-ir-plan-step-by-step</link><guid isPermaLink="false">1510a15b5e9ad82fa429290ecb5b9e4c</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:43 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019d768df562e2934788c_693c74f5fd71cb1385d32cb2_Building-Your-IR-Plan-Featured.jpeg"/></item><item><title><![CDATA[How to Catch a Cyber Culprit: Fingerprint, Then Investigate]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019bdaf6f316a474f489d_693c74a385765ecb7350f0f2_proactive-security-asset-preview.jpeg" style="width: 100%;" /><div>Catching cyber culprits will always be a cat and mouse game, read this blog to learn 10 tips for web asset fingerprinting, and stay a step ahead of attackers.</div></div>]]></description><link>https://www.domaintools.com/blog/how-to-catch-a-cyber-culprit-fingerprint-then-investigate</link><guid isPermaLink="false">c4517a85757fefb165f3ca28094d62f1</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:43 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019bdaf6f316a474f489d_693c74a385765ecb7350f0f2_proactive-security-asset-preview.jpeg"/></item><item><title><![CDATA[CovidLock: Mobile Coronavirus Tracking App Coughs Up Ransomware]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019cda6476ea15cbde7d9_693c74ebc484cad7379adee0_Mobile-Coronavirus-Tracking-App-Coughs-Up-Ransomware-Featured.jpeg" style="width: 100%;" /><div>The security research team at DomainTools recently observed an uptick in suspicious Coronavirus and COVID-19 domains, leading them to discover CovidLock, a malicious Andr</div></div>]]></description><link>https://www.domaintools.com/blog/covidlock-mobile-coronavirus-tracking-app-coughs-up-ransomware</link><guid isPermaLink="false">56c383c7300bc2c7d611db21c31fba8b</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:43 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694019cda6476ea15cbde7d9_693c74ebc484cad7379adee0_Mobile-Coronavirus-Tracking-App-Coughs-Up-Ransomware-Featured.jpeg"/></item><item><title><![CDATA[Best Practices for Data Diaries in Investigative Journalism and Beyond]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a6612d27e812ea6dd1_693c6c4e0754663dd895f602_blog-migration-image-1-Resource-Featured.jpeg" style="width: 100%;" /><div>Learn how top data journalists keep data diaries for their investigations</div></div>]]></description><link>https://www.domaintools.com/blog/best-practices-for-data-diaries-in-investigative-journalism-and-beyond</link><guid isPermaLink="false">e4936e63b7cc6fd5f0158d84252514b3</guid><dc:creator><![CDATA[domaintools.com]]></dc:creator><pubDate>Sun, 22 Feb 2026 20:48:43 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6914bc46af7a937a5c07eea3/694018a6612d27e812ea6dd1_693c6c4e0754663dd895f602_blog-migration-image-1-Resource-Featured.jpeg"/></item></channel></rss>