In-depth research and technical guides from our threat intelligence team.
Comprehensive analysis of ransomware trends, tactics, and defense strategies for 2024.
Technical guide for integrating threat intelligence into SIEM, SOAR, and security tools.
Understanding how domain risk scores are calculated and how to interpret them.
Research on how NRDs are used in phishing and malware campaigns.
Best practices for starting and maturing your threat intelligence capability.
How threat intelligence supports SOC 2 compliance requirements.
Our whitepapers represent hundreds of hours of research by our threat intelligence team. Each publication provides actionable insights backed by data from our analysis of millions of malicious domains, IPs, and URLs. Unlike surface-level blog posts, these technical documents offer comprehensive coverage of complex topics including attack methodologies, defense strategies, and emerging threat trends. Perfect for security professionals who need in-depth understanding to make informed decisions.
Every claim in our whitepapers is supported by real-world data. We analyze patterns across our threat intelligence feeds, correlate findings with industry reports, and provide statistical evidence for our conclusions. Our research methodology includes: • Analysis of millions of domain registrations monthly • Correlation with known malware campaigns • WHOIS data analysis for attribution insights • Certificate transparency log monitoring • Passive DNS intelligence gathering
Beyond theoretical knowledge, our whitepapers include practical implementation guidance. Each document provides step-by-step instructions for applying research findings to your security program. Whether you're building a threat intelligence program from scratch or optimizing existing defenses, you'll find code examples, configuration templates, and integration patterns that accelerate implementation. Our technical guides are written by practitioners for practitioners.
Continue your research with these related articles.

Annual analysis of ransomware landscape and what to expect.
Read More
How DNS-level blocking improves your security posture.
Read More
From zero to mature: Steps to effective TI capability.
Read MoreSubscribe to receive new research and guides when they're published.