DomainTools’ cover photo
DomainTools

DomainTools

Computer and Network Security

Seattle, WA, Washington 23,289 followers

Detect. Investigate. Prevent.

About us

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify external risks, investigate threats, and proactively protect their organizations in a constantly evolving threat landscape. DomainTools constantly monitors the Internet and brings together the most comprehensive and trusted domain, website and DNS data to provide immediate context and machine-learning driven risk analytics delivered in near real-time. Visit domaintools.com to experience firsthand why DomainTools is the first stop for advanced security teams when they need to know.

Website
https://www.DomainTools.com
Industry
Computer and Network Security
Company size
51-200 employees
Headquarters
Seattle, WA, Washington
Type
Privately Held
Founded
2004
Specialties
Domain Ownership Records, Brand Protection, Whois Records, Threat Investigation, Cybercrime Investigation, Cyber Security Investigation, Whois History, Reverse Whois Lookup, Name Server Monitoring, Online Fraud Detection, and Threat Intelligence

Locations

Employees at DomainTools

Updates

  • Thanks for including Ian Campbell in your video, tricia howard and Akamai Technologies! This one-minute video shares a number of useful recommendations on keeping up to date with the latest threats, not to mention great #infosec shirts 👀.

    View organization page for Akamai Technologies

    461,812 followers

    What’s your personal hack for keeping up with attackers’ constant switch-ups? Tricia Howard asked attendees for their go-to strategies, from continuous testing to staying ahead of new threats. There may have also been a few questions about superhero LLMs and the wildest swag on the floor.

  • View organization page for DomainTools

    23,289 followers

    Jon DiMaggio, Chief Security Strategist at Analyst1, has done it again. His latest Ransomware Diaries piece, "I Had to Take the Guilt For Everyone," is a must-read. Coming out alongside his DEF CON talk, this article provides unprecedented insight into the personal life of Yaroslav Vasinskyi, who claims he was "hired criminal labor, not the mastermind." It’s an incredible look at the complex web of coercion, state interests, and personal stories behind one of the most significant ransomware attacks in history. A huge shoutout to Jon for his groundbreaking work in bringing these stories to light. We're proud to amplify his efforts and encourage everyone to read his full report. Read the full story here: https://lnkd.in/gsS2wi6v #ransomware #cybersecurity #DEFCON #analyst1 #threatintelligence #infosec #kaseya #REvil

  • DomainTools reposted this

    View profile for Jon DiMaggio

    Published Author and Chief Security Strategist at Analyst1 (Author of SANS Difference Maker Award Book of the Year 2022 AND 2023!) Author of the Ransomware Diaries, DEFCON speaker and featured on 60 Minutes.

    🔎 New: Inside the Mind of a Ransomware Actor: My 8-Month Conversation with REvil’s Yaroslav Vasinskyi This week, I’m publishing what’s probably my favorite and most nerve-wracking, chapter 7 of Ransomware Diaries so far. Why? Because of the story behind it. Over the past seven months, I’ve been in close communication with Yaroslav Vasinskyi, the man behind the Kaseya attack, who is currently doing his time in jail. It’s been a journey full of unexpected revelations from many different angles. To clarify: Vasinskyi reached out to me. He wanted to talk. He wanted to tell his side of the story. And this was different, because for the first time, I was speaking with someone who is currently serving time for the cybercrimes he committed. From the beginning, I made it clear: ‼️My reporting would be public, and I had no intention of justifying his actions or glorifying cybercrime. ‼️My goal was simple - to understand. To learn from his story and to share it. What followed was a series of phone calls from prison, letters, and emails, all telling fragments of a much bigger story. Some of what Vasinskyi shared will feel controversial. It certainly did to me. There’s a narrative of a young man facing enormous pressure and personal struggles. But this is not an attempt to excuse what he did. It never is. Instead, it’s an exploration of what was happening behind the scenes. Of what led him there. I’ve shared his story as openly as I could, leaving out a few details that, for now, remain off the record. But what’s there is real. It’s raw. And it’s an invitation to understand the human side of a high-profile cybercrime case. Because sometimes, understanding is the first step toward prevention.

  • DomainTools reposted this

    In Episode 8 of Human Element, Daniel Schwalbe, CISO & Head of Investigations at DomainTools, shares a career-defining lesson: cover it up or own the mistake. Early in his career, he accidentally deleted 10 years of a professor’s research during a Windows upgrade. He chose honesty, expecting to be fired, but instead, the professor valued his integrity and proved that how you handle mistakes matters more than the mistakes themselves. That moment became the foundation of his approach to building teams with character and integrity, especially when moving from technical expertise to leadership. We’ve all had someone who’s had our back or made a real difference in our career. Tag them in the comments to show your appreciation for how they’ve helped shape who you are today. Listen to the full interview here: https://lnkd.in/gNJNdRT3

    • No alternative text description for this image
  • We're excited to share that our CISO, Daniel Schwalbe, was recently featured on the Maltego Technologies podcast! In the episode titled "DomainTools' Daniel Schwalbe on Navigating Leadership Transitions," Daniel discusses the unique challenges of promoting technical experts into leadership roles and the importance of professional networking in the security industry. He shares valuable insights on building trust, developing leadership skills, and managing remote security teams. Listen to the full episode to learn more about his approach to security leadership and career development. Listen here: https://lnkd.in/gQf2ZuEa #Cybersecurity #Leadership #Podcast #CISO #SecurityLeadership

  • View organization page for DomainTools

    23,289 followers

    What an incredible experience at DEF CON 33! We were thrilled to present on a critical, yet often overlooked, attack vector: the exploitation of DNS TXT records. In our talk, Ian Campbell and Malachi Walker peeled back the layers to reveal how attackers can leverage TXT records to hide malicious code, distribute payloads, and set up covert communication channels. It was eye-opening to demonstrate these techniques with real-world examples, offering a clear picture of discovery and attribution in action. For all the defenders out there, we shared related indicators as well as how to monitor TXT records effectively and harness security solutions to combat this hidden threat. We hope the discussion empowered this awesome community as we all work to foster a stronger, more collaborative defense ecosystem. #DEFCON #Cybersecurity #DNS #ThreatDetection #InfoSec #CyberDefense

    • Presentation at a DEF CON with a slide titled "Domains Convey Intent" displayed on a screen, as two speakers stand beside it addressing an audience.
  • View organization page for DomainTools

    23,289 followers

    We had a blast at DEF CON! Our interactive DNS Scavenger Hunt, spearheaded by our very own Malachi Walker in the BIC Village, proved to be an exciting challenge. Attendees truly sharpened their investigative skills, expertly navigating the command line to uncover clues, domains, subdomains, and DNS records – all to outsmart simulated threat actors. It was a privilege to demonstrate our unwavering commitment to cybersecurity. #DEFCON #Cybersecurity #DNS #ScavengerHunt #Commandline #ThreatHunting #BICVillage

    • Person presenting at a podium with a presentation slide titled "Agenda - Get in Rhythm" displayed on screen, at a conference in Las Vegas.
  • View organization page for DomainTools

    23,289 followers

    Daniel Schwalbe had a blast presenting at DEF CON Recon Village! Participants demonstrated their subdomain enumeration approach, which used passive DNS and focused on RRnames and RRtypes. They also tackled DNS wildcards, an often hidden and surprising attack surface. The talk showed how to assess wildcard status, advocating a new "standard of care" for all (FQDN, RRtype) combinations. #DEFCON #Cybersecurity #Reconnaissance #DNS #Infosec

    • Daniel Schwalbe  presenting at a conference in front of a slide titled "Analytical Roles of DNS Data Points" at the OSINT Village, DEFCON 33. Banners of various sponsors are displayed behind the speaker.

Similar pages

Browse jobs