DomainTools

821 Followers
168 Following
571 Posts
A global leader for internet #intel that enables security practitioners to proactively defend their organization in a constantly evolving threat landscape.
Websitewww.domaintools.com
Twitterhttps://twitter.com/DomainTools
Podcasthttps://www.domaintools.com/resources/podcasts/

The most critical indicators, all in one place

New enhancements to the DomainTools App for Cortex by Palo Alto Networks deliver real-time streaming of critical intelligence feeds, providing seamless access to DomainTools data across Cortex.

Learn more: https://www.domaintools.com/blog/domaintools-palo-alto-networks-best-in-class-dns-intelligence

DomainTools & Palo Alto Networks: Best in class DNS Intelligence

Learn how DomainTools and Palo Alto Networks Cortex combine best-in-class DNS intelligence with automated playbooks and ML-powered risk scoring to help security teams detect, investigate, and respond to threats faster.

Want to see how the world's best CTI teams map adversary DNS? 🗺️
We’re heading to #BlackHatAsia 2026 to share how we provide 97% internet visibility and detection 10 days ahead of blocklists.
Let's grab coffee! Book 20 mins here ➡️ https://www.domaintools.com/events/black-hat-asia
#BHA2026 #OSINT
DomainTools | Black Hat Asia

🕵️DTI released an analysis of activity attributed to Homeland Justice, Karma/KarmaBelow80, and Handala as a single, coordinated cyber influence ecosystem aligned with Iran’s MOIS.
Read our investigation here: https://dti.domaintools.com/research/handala-mois-linked-cyber-influence-ecosystem-threat-intelligence-assessment
#Cybersecurity #Iran #InfoSec #ThreatIntel
DomainTools Investigations | Handala: MOIS Linked Cyber Influence Ecosystem Threat Intelligence Assessment

Discover how Handala, Homeland Justice, and Karma function as a unified MOIS-linked cyber influence ecosystem. This threat intelligence assessment reveals how Iran uses "hack-and-leak" operations to weaponize perception over technical complexity.

Connecting your LLM to DomainTools is an instant force multiplier ⚡

Analysts get Domain intelligence directly in their chat interface. No context-switching - just natural language answers at the speed of chat.

Technical breakdown & examples ⬇️ https://www.domaintools.com/blog/integrating-domaintools-into-the-ai-powered-soc

Integrating DomainTools into the AI-Powered SOC

🇰🇵Beyond the Fracture: DomainTools Investigations’ latest research analyzes the fragmented and parallel development pipelines behind North Korea’s specialized malware ecosystem.
Read the research here:https://dti.domaintools.com/research/dprk-malware-modularity-diversity-and-functional-specialization
#Cybersecurity #InfoSec #NorthKorea #Malware #Research
DomainTools Investigations | DPRK Malware Modularity: Diversity and Functional Specialization

Explore the DPRK’s modular malware architecture. Analyze how North Korea uses compartmentalized toolchains for espionage, crypto theft, and strategic signaling.

At #FIC2026?🇫🇷 Don't miss our Principal Engineer Maxime Zielony's presentation tomorrow!

🎤 From Days to Seconds: The Evolution of Real-Time DNS Intelligence
📍 INCYBER Demos Stage, INCYBER Forum
🕒 Thursday, 02 April, 2026 2:00 PM to 2:30 PM · 30 min. (Europe/Paris)

We’re thrilled to announce our new MCP server, enabling you to access DomainTools intelligence directly within your AI workflows. Use natural language prompts for instant analysis of risky infrastructure - no new UI involved.

Learn more today: http://www.domaintools.com/press/domaintools-launches-mcp-server-connecting-ai-agents-directly-to-20-years-of-domain-intelligence

DomainTools | DomainTools Launches MCP Server, Connecting AI Agents Directly to 20+ Years of Domain Intelligence

Shift your posture from reactive to proactive at #BHA2026. 🇸🇬
With DomainTools, your team can:
✅ Automate the hunt
✅ Contextualize alerts
✅ Get more from your existing stack
Meet us in Singapore ➡️ https://www.domaintools.com/events/black-hat-asia
#BlackHatAsia #ThreatIntel
DomainTools | Black Hat Asia

This "ChatGPT Ad Blocker"🚧 extension is a data-harvesting tool.
It clones your ChatGPT conversations and sends them to a Discord webhook.
Learn more: https://dti.domaintools.com/securitysnacks/securitysnack-openai-anti-ads-malware

#CyberSecurity #ChatGPT #DataPrivacy #Infosec

DomainTools Investigations | SecuritySnack - OpenAI Anti-Ads Malware

Stay protected against the "ChatGPT Ad Blocker" malware. This investigation reveals how a malicious Chrome extension uses Discord webhooks to steal private ChatGPT conversations, prompts, and metadata.

Planning your #FIC2026 schedule?

Stop by the DomainTools booth # G49 for a live demo and a quick conversation with our team.
We’re happy to meet over a coffee ☕nearby – or connect virtually if you can’t make it.