<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[DomainTools Investigations]]></title><description><![CDATA[DomainTools Investigations]]></description><link>https://rss.app</link><image><url>https://rss.app/static/img/icons/rss-app.png</url><title>DomainTools Investigations</title><link>https://rss.app</link></image><generator>https://rss.app</generator><lastBuildDate>Mon, 13 Apr 2026 16:53:47 GMT</lastBuildDate><atom:link href="https://rss.app/feeds/_6EavJGnrhVEC22vA.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><item><title><![CDATA[Fifteen (Newsletters) On A Skateboard]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69d7f887a3693ff951a96677_dti-march-newsletter.jpg" style="width: 100%;" /><div>DTI's March newsletter covers Doppelgänger disinformation infrastructure analysis, Cloudflare-abusing phishing campaigns, a TLS private key exposure in Qihoo 360's AI platform, and a malicious ChatGPT ad blocker Chrome extension stealing user conversations.</div></div>]]></description><link>https://dti.domaintools.com/newsletters/fifteen-newsletters-on-a-skateboard</link><guid isPermaLink="false">8df169c3f4050b2851fdfb6f787c027c</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Thu, 09 Apr 2026 20:09:09 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69d7f887a3693ff951a96677_dti-march-newsletter.jpg"/></item><item><title><![CDATA[DomainTools Investigations | Handala: MOIS Linked Cyber Influence Ecosystem Threat Intelligence Assessment]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69d41ce29c8843926e8556e3_Handala.webp" style="width: 100%;" /><div>Discover how Handala, Homeland Justice, and Karma function as a unified MOIS-linked cyber influence ecosystem. This threat intelligence assessment reveals how Iran uses "hack-and-leak" operations to weaponize perception over technical complexity.</div></div>]]></description><link>https://dti.domaintools.com/research/handala-mois-linked-cyber-influence-ecosystem-threat-intelligence-assessment</link><guid isPermaLink="false">c40c449cdcc91b6c6b8abdea69891c62</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Mon, 06 Apr 2026 21:53:05 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69d41ce29c8843926e8556e3_Handala.webp"/></item><item><title><![CDATA[DomainTools Investigations | Cybersecurity Reading List - Week of 2026-04-06]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69d3fd07f6206f9d916cce8e_Reading%20List%20-%20April%202026.webp" style="width: 100%;" /><div>From Gramsci's 'morbid symptoms' to modern threat intelligence - a cybersecurity roundup exploring why defenders should treat root causes over chasing dramatic threats, with curated links on ransomware, HUMINT, disinformation, and more.</div></div>]]></description><link>https://dti.domaintools.com/securitysnacks/cybersecurity-reading-list-week-of-2026-04-06</link><guid isPermaLink="false">5de0adfa1703e5fdee6d8a4add96638b</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Mon, 06 Apr 2026 20:54:15 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69d3fd07f6206f9d916cce8e_Reading%20List%20-%20April%202026.webp"/></item><item><title><![CDATA[DomainTools Investigations | DPRK Malware Modularity: Diversity and Functional Specialization]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69d01476d8e0fd53e1f75c6f_dti-new-post.webp" style="width: 100%;" /><div>Explore the DPRK’s modular malware architecture. Analyze how North Korea uses compartmentalized toolchains for espionage, crypto theft, and strategic signaling.</div></div>]]></description><link>https://dti.domaintools.com/research/dprk-malware-modularity-diversity-and-functional-specialization</link><guid isPermaLink="false">9a23c2f5543482a0762f1a22fb3fd04a</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Mon, 06 Apr 2026 18:37:49 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69d01476d8e0fd53e1f75c6f_dti-new-post.webp"/></item><item><title><![CDATA[DomainTools Investigations | SecuritySnack - OpenAI Anti-Ads Malware]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69c583aa07330b086e9c0db9_69c581b726e3dbeb365d2a9f_86453bf9.png" style="width: 100%;" /><div>Stay protected against the "ChatGPT Ad Blocker" malware. This investigation reveals how a malicious Chrome extension uses Discord webhooks to steal private ChatGPT conversations, prompts, and metadata.</div></div>]]></description><link>https://dti.domaintools.com/securitysnacks/securitysnack-openai-anti-ads-malware</link><guid isPermaLink="false">497fe9a3de398db1aa3e54605df08cf5</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Wed, 01 Apr 2026 14:09:10 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69c583aa07330b086e9c0db9_69c581b726e3dbeb365d2a9f_86453bf9.png"/></item><item><title><![CDATA[DomainTools Investigations | Exposure of TLS Private Key for Myclaw 360 in Qihoo 360 “Security Claw” AI Platform]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69b9d6a540102427226375d5_dti-open-claw-certificate.webp" style="width: 100%;" /><div>DTI analysis of a leaked TLS private key from Qihoo 360's AI security platform, covering cryptographic validation, threat scenarios, and incident response.</div></div>]]></description><link>https://dti.domaintools.com/research/exposure-of-tls-private-key-for-myclaw-360-in-qihoo-360-security-claw-ai-platform</link><guid isPermaLink="false">641c032f1aef7ad5e4195a18c9f84d51</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Thu, 26 Mar 2026 19:05:44 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69b9d6a540102427226375d5_dti-open-claw-certificate.webp"/></item><item><title><![CDATA[DomainTools Investigations | SecuritySnack - CloudFlare Anti-Security For Phishing]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69b1d0c4b618f2c36d2c4dfe_security-snack-cloudflare-thumb.webp" style="width: 100%;" /><div>A Microsoft 365 credential harvesting campaign is exploiting CloudFlare's anti-bot and human verification features to evade detection. Learn how attackers use IP blocklists, user-agent filtering, and obfuscated scripts to bypass security scanners—and what it means for the industry.</div></div>]]></description><link>https://dti.domaintools.com/securitysnacks/securitysnack-cloudflare-anti-security-for-phishing</link><guid isPermaLink="false">cc1308a4263c0271624ecb0246870ee5</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Wed, 11 Mar 2026 21:26:06 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69b1d0c4b618f2c36d2c4dfe_security-snack-cloudflare-thumb.webp"/></item><item><title><![CDATA[Fourteen Newsletters and Fifteen Winters]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69a9ef1a07521c63b9d00cc2_dt-newsletter-february-2026.webp" style="width: 100%;" /><div>Learn how Lotus Blossom (G0030) weaponized Notepad++ updates. Plus, a deep dive into 250+ crypto scam domains and upcoming BSides San Francisco sessions.</div></div>]]></description><link>https://dti.domaintools.com/newsletters/fourteen-newsletters-and-fifteen-winters</link><guid isPermaLink="false">22185bda53c367c4045b376ff8dd599d</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Thu, 05 Mar 2026 21:25:39 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69a9ef1a07521c63b9d00cc2_dt-newsletter-february-2026.webp"/></item><item><title><![CDATA[DomainTools Investigations | Cybersecurity Reading List - Week of 2026-03-02]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69a74bce8a5892122f7fb45d_dt-reading-list-march.webp" style="width: 100%;" /><div>A broken snowblower belt taught me something cybersecurity professionals often forget — saying "I don't know" isn't failure. It's where the real work begins.</div></div>]]></description><link>https://dti.domaintools.com/securitysnacks/cybersecurity-reading-list-week-of-2026-03-02</link><guid isPermaLink="false">8f3a2e1747832c42dada889b6a17911b</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Tue, 03 Mar 2026 21:59:22 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69a74bce8a5892122f7fb45d_dt-reading-list-march.webp"/></item><item><title><![CDATA[DomainTools Investigations | Doppelgänger / RRN Disinformation Infrastructure Ecosystem 2026]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69a20a6b1497dc8058dd1060_dti-disinformation-infrastructure-ecosystem.webp" style="width: 100%;" /><div>Analysis of the Doppelgänger / RRN disinformation ecosystem. Learn how this DevOps-style infrastructure uses automated media impersonation, TLD rotation, and cloud-native hosting to target global audiences and evade enforcement.</div></div>]]></description><link>https://dti.domaintools.com/research/doppelganger-rrn-disinformation-infrastructure-ecosystem</link><guid isPermaLink="false">f8d1726804cc690b0261f89e0b4286b1</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Tue, 03 Mar 2026 21:23:35 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/69a20a6b1497dc8058dd1060_dti-disinformation-infrastructure-ecosystem.webp"/></item><item><title><![CDATA[DomainTools Investigations | SecuritySnack ]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/699f41ee6690b568edfe8d32_security-snack-cover.webp" style="width: 100%;" /><div>An analysis of an active cryptocurrency scam operation impersonating Trump, Musk, and Truth Social across 250+ domains — uncovering shared wallet infrastructure, on-chain laundering pipelines, and the tactics used to fake legitimacy.</div></div>]]></description><link>https://dti.domaintools.com/securitysnacks/securitysnack-idolized-crypto-scams</link><guid isPermaLink="false">acdd8c3a2d75ba5d87dd84d4636bc9ee</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Wed, 25 Feb 2026 18:44:25 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/699f41ee6690b568edfe8d32_security-snack-cover.webp"/></item><item><title><![CDATA[DomainTools Investigations | Lotus Blossom (G0030) and the Notepad++ Supply-Chain Espionage Campaign]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/698cdfca3749329b927ce162_lotus-blossom.png" style="width: 100%;" /><div>How Lotus Blossom (G0030) compromised the Notepad++ update pipeline in a precision supply-chain espionage campaign targeting high-value organizations.</div></div>]]></description><link>https://dti.domaintools.com/research/lotus-blossom-and-the-notepad-supply-chain-espionage-campaign</link><guid isPermaLink="false">4b19c95fa41497b6caed93cb670cb065</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Wed, 18 Feb 2026 22:21:24 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/698cdfca3749329b927ce162_lotus-blossom.png"/></item><item><title><![CDATA[Seven Nation Newsletter: I'm goin' to Wichita!]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6942f20fabf27026d04c63d1_July-2024-Newsletter-Imag.png" style="width: 100%;" /><div>If you are a returning reader, welcome back! If you are a new reader, what you are about to read is news from our group of researchers and analysts, where they provide their expertise in investigating, mitigating, and preventing Domain and DNS based attacks.</div></div>]]></description><link>https://dti.domaintools.com/newsletters/july-2025-dti-newsletter</link><guid isPermaLink="false">f703633da708e901d32382218e4e9def</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Wed, 18 Feb 2026 22:19:29 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6942f20fabf27026d04c63d1_July-2024-Newsletter-Imag.png"/></item><item><title><![CDATA[Guess who's back, back again? DTI’s back, tell a friend!]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6942f20e2d31829756a3e64e_guess-whos-back-feature-image.png" style="width: 100%;" /><div>Daniel Schwalbe shares the latest from DomainTools Investigations (DTI) including more on our previously reported cluster of Chinese malware delivery domains, an upcoming webinar, and events where you can meet the DTI team.</div></div>]]></description><link>https://dti.domaintools.com/newsletters/february-2025-dti-newsletter-2</link><guid isPermaLink="false">045c3dbbb5e96aa4cdf166624ed11d82</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Wed, 18 Feb 2026 22:19:21 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6942f20e2d31829756a3e64e_guess-whos-back-feature-image.png"/></item><item><title><![CDATA[DomainTools Investigations | CTI Grapevine Becomes DomainTools Investigations]]></title><link>https://dti.domaintools.com/research/cti-grapevine-becomes-domaintools-investigations</link><guid isPermaLink="false">450f5b9f172e82c3f92d3cd976a12b89</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Tue, 10 Feb 2026 19:48:42 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6953cba54a6c5b2155e9b0a9_Investigations.webp"/></item><item><title><![CDATA[Thirteen Silver Newsletters]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6984ec44d1e5ba2f9d54388f_image.jpeg" style="width: 100%;" /><div>DomainTools Investigations kicks off 2026 with deep dives into the KnownSec leak exposing China's cyberespionage ecosystem, predatory online gambling apps, and a phishing campaign weaponizing fake job interviews.</div></div>]]></description><link>https://dti.domaintools.com/newsletters/thirteen-silver-newsletters</link><guid isPermaLink="false">1f6a458413f756384c12493e531e8bcd</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Mon, 09 Feb 2026 19:39:36 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6984ec44d1e5ba2f9d54388f_image.jpeg"/></item><item><title><![CDATA[Newsletter Number 9, Keep On Movin' Down The Line]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6942f2106b4473300943e7f4_September-2025-Newsletter.png" style="width: 100%;" /><div>My team has been on a tear this month, we've published new research on Salt Typhoon, an advanced Chinese APT, and we've analyzed the massive Kimsuky leak, giving us a rare look into a North Korean threat actor's playbook. We also identified new activity from the PoisonSeed e-crime group, and uncovered a banking trojan targeting Android users in Southeast Asia. Let's get you up to speed!</div></div>]]></description><link>https://dti.domaintools.com/newsletters/september-2025-dti-newsletter</link><guid isPermaLink="false">0ec98539f05c3f82cd604ea887c34ef5</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Thu, 05 Feb 2026 20:24:13 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6942f2106b4473300943e7f4_September-2025-Newsletter.png"/></item><item><title><![CDATA[Eight Days a Newsletter: I lo-o-o-ove research!]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6942f210a82bb4c15590887f_August-2025-Newsletter.jpeg" style="width: 100%;" /><div>If you are a returning reader, welcome back! If you are a new reader, what you are about to read is news from our group of researchers and analysts, where they provide their expertise in investigating, mitigating, and preventing Domain and DNS based attacks.So without further ado, here’s what our incredible team has been up to for the rest of August.</div></div>]]></description><link>https://dti.domaintools.com/newsletters/august-2025-dti-newsletter</link><guid isPermaLink="false">a5aa0568dcfec4b1c573c394229cf75a</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Thu, 05 Feb 2026 20:24:13 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6942f210a82bb4c15590887f_August-2025-Newsletter.jpeg"/></item><item><title><![CDATA[Newsletter No. 5: A Little Bit of Research in my life…]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6941445876ba1afe6af847bb_693c85267903b7e7e55f73d3_may-newsletter-feature-image.png" style="width: 100%;" /><div>The May 2025 DomainTools Investigations Newsletter covers news regarding a malicious campaign using a fake website to spread VenomRAT, malicious Chrome Browser extensions, viral media events capturing the attention of bad actors, and more</div></div>]]></description><link>https://dti.domaintools.com/newsletters/may-2025-dti-newsletter</link><guid isPermaLink="false">a582ba18c639dc4258dc55e81a30ea41</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Thu, 05 Feb 2026 20:24:13 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6941445876ba1afe6af847bb_693c85267903b7e7e55f73d3_may-newsletter-feature-image.png"/></item><item><title><![CDATA[Tenth Newsletter Freeze-Out]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6942f46568e0d2a97ad58ffc_Screenshot-2025-10-27-at-4.33.12-PM-1.png" style="width: 100%;" /><div>Cybersecurity deep dive: NPM Phishing, Crypto Scams, & 18+ E-Crime analysis. Get expert research on supply chain attacks, wallet drain schemes, and trojans targeting social media. Plus, BSides NoVa recap & top reading list.</div></div>]]></description><link>https://dti.domaintools.com/newsletters/tenth-newsletter-freeze-out</link><guid isPermaLink="false">4c73355abbea3a0f2efa2519b3ec4981</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Thu, 05 Feb 2026 19:52:54 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6942f46568e0d2a97ad58ffc_Screenshot-2025-10-27-at-4.33.12-PM-1.png"/></item><item><title><![CDATA[Newsletter 11 Could Take Forever]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6941445876ba1afe6af84759_693c84fcb330390009781c14_Newsletter-Image-November-1-pdf.jpeg" style="width: 100%;" /><div>Dive into DomainTools Investigations' latest threat intel! Read our 3-part series on China's Great Firewall leak and an analysis of APT35 (Charming Kitten) campaigns targeting the Middle East and Korea, focusing on Exchange attacks. Get the intelligence you need!</div></div>]]></description><link>https://dti.domaintools.com/newsletters/newsletter-11-could-take-forever</link><guid isPermaLink="false">ea6ff2c5e1926aaedb45dc5a5a3f398c</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Thu, 05 Feb 2026 19:52:42 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6941445876ba1afe6af84759_693c84fcb330390009781c14_Newsletter-Image-November-1-pdf.jpeg"/></item><item><title><![CDATA[1, 2, 3, 4 Tell Me That You Love Newsletters]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6941445876ba1afe6af847ae_693c851e2848ceb668595ddb_april-newsletter-feature-image.png" style="width: 100%;" /><div>The April 2025 DomainTools Investigations newsletter covers our inaugural Domain intelligence year-in-review report along with research completed in the month of April on Proton66, SpyNote Malware, and malicious browser extensions and AI slop.</div></div>]]></description><link>https://dti.domaintools.com/newsletters/april-2025-dti-newsletter</link><guid isPermaLink="false">e071da38e1d3395094f7356c53f713f2</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Thu, 05 Feb 2026 19:52:28 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6941445876ba1afe6af847ae_693c851e2848ceb668595ddb_april-newsletter-feature-image.png"/></item><item><title><![CDATA[It's 6’n the Mornin’ (and my Newsletter at your door!)]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6942f20effcaaf31648927ca_June-Newsletter-Image.jpeg" style="width: 100%;" /><div>Where has this year gone?! We are six months into formally launching DomainTools Investigations (DTI) and subsequently this newsletter! If you’re a returning reader, I’m glad you keep coming back! If you’re a new reader, what you’re about to read is news from our group of researchers and analysts providing their expertise in investigating, mitigating, and preventing Domain and DNS based attacks.</div></div>]]></description><link>https://dti.domaintools.com/newsletters/june-2025-dti-newsletter</link><guid isPermaLink="false">4cb8838077994f8a6d52098e46b2220e</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Thu, 05 Feb 2026 19:52:13 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6942f20effcaaf31648927ca_June-Newsletter-Image.jpeg"/></item><item><title><![CDATA[DT Investigations - Security Research for the Community]]></title><description><![CDATA[<div><img src="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6941445876ba1afe6af8475d_693c84fdb330390009781c41_dti-newsletter-feature-image.png" style="width: 100%;" /><div>Daniel Schwalbe, CISO and Head of Investigations, shares his inaugural DomainTools Investigations newsletter.</div></div>]]></description><link>https://dti.domaintools.com/newsletters/january-2025-dti-newsletter</link><guid isPermaLink="false">eb304cc184986143bef5b10be7ca6774</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Thu, 05 Feb 2026 19:52:08 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6941445876ba1afe6af8475d_693c84fdb330390009781c41_dti-newsletter-feature-image.png"/></item><item><title><![CDATA[March 2025 DTI Newsletter: I Like Newsletters and I Cannot Lie]]></title><link>https://dti.domaintools.com/newsletters/march-2025-dti-newsletter</link><guid isPermaLink="false">75225ec2008177dbd48994d40aee4211</guid><dc:creator><![CDATA[dti.domaintools.com]]></dc:creator><pubDate>Thu, 05 Feb 2026 19:52:03 GMT</pubDate><media:content medium="image" url="https://cdn.prod.website-files.com/6941445776ba1afe6af83186/6941445876ba1afe6af84776_693c850d4e1465e6c5acc33a_march-dti-newsletter-feature-image.jpeg"/></item></channel></rss>