Whitepapers

Research & Technical Guides

In-depth research and technical guides from our threat intelligence team.

Research

The State of Ransomware 2024

Comprehensive analysis of ransomware trends, tactics, and defense strategies for 2024.

42 pages2024-01
Technical

Threat Intelligence Integration Guide

Technical guide for integrating threat intelligence into SIEM, SOAR, and security tools.

28 pages2023-12
Technical

Domain Reputation Scoring Methodology

Understanding how domain risk scores are calculated and how to interpret them.

18 pages2023-11
Research

Newly Registered Domains: A Threat Vector

Research on how NRDs are used in phishing and malware campaigns.

24 pages2023-10
Best Practices

Building a Threat Intelligence Program

Best practices for starting and maturing your threat intelligence capability.

35 pages2023-09
Compliance

SOC 2 Compliance with Threat Intelligence

How threat intelligence supports SOC 2 compliance requirements.

16 pages2023-08

Deep-Dive Security Research & Analysis

Our whitepapers represent hundreds of hours of research by our threat intelligence team. Each publication provides actionable insights backed by data from our analysis of millions of malicious domains, IPs, and URLs. Unlike surface-level blog posts, these technical documents offer comprehensive coverage of complex topics including attack methodologies, defense strategies, and emerging threat trends. Perfect for security professionals who need in-depth understanding to make informed decisions.

Evidence-Based Threat Intelligence

Every claim in our whitepapers is supported by real-world data. We analyze patterns across our threat intelligence feeds, correlate findings with industry reports, and provide statistical evidence for our conclusions. Our research methodology includes: • Analysis of millions of domain registrations monthly • Correlation with known malware campaigns • WHOIS data analysis for attribution insights • Certificate transparency log monitoring • Passive DNS intelligence gathering

Practical Implementation Guidance

Beyond theoretical knowledge, our whitepapers include practical implementation guidance. Each document provides step-by-step instructions for applying research findings to your security program. Whether you're building a threat intelligence program from scratch or optimizing existing defenses, you'll find code examples, configuration templates, and integration patterns that accelerate implementation. Our technical guides are written by practitioners for practitioners.

Get New Whitepapers First

Subscribe to receive new research and guides when they're published.