In-depth research and technical guides from our threat intelligence team.
Essential reading for DNS security and threat intelligence professionals
Analysis of 100.8M newly observed domains revealing 25.1% were malicious or suspicious. Covers AI-driven threats and malicious adtech trends.
New domains surpassed phishing and malware as the most trafficked threat category, with a 140% increase in Q1 2025.
Curated whitepapers from leading cybersecurity organizations
Practical blueprint for developing a modern threat intelligence program, including threat modeling and priority intelligence requirements.
Executive insights from government and industry leaders on strengthening threat intelligence programs.
Comprehensive insights from Google Cloud security experts on threats and challenges anticipated in 2026.
How ransomware actors leverage AI and target identities. Includes extortion trends, payment rates, and PAM strategies.
Analysis of ransomware escalation, rise of new groups, and their impact on SMBs. Includes third-party monitoring recommendations.
Official CISA report to Congress outlining strategies for implementing Zero Trust Architecture within federal agencies.
Insights on strengthening cloud and AI security strategies with contributions from Dr. Anton Chuvakin and Dr. Paul Vixie.
Assessment of CISA CPG adoption across 7,791 critical infrastructure organizations based on vulnerability exposure data.
Comprehensive strategies for managing data security within a Zero Trust framework from the Federal CISO Council.
Insights into active ransomware groups, top threat trends, and analysis of 2024 predictions vs 2025 realities.
We've curated the most valuable cybersecurity whitepapers and research reports from leading organizations including CISA, ISACA, Google Cloud, and top security vendors. Each resource has been selected for its relevance to threat intelligence, domain security, and modern cybersecurity challenges. These publications provide actionable insights backed by real-world data, helping security professionals make informed decisions about their threat intelligence and security programs.
The threat landscape evolves rapidly. Our curated collection includes the latest research on: • DNS-based threats and newly registered domain abuse • Ransomware tactics, techniques, and procedures (TTPs) • Zero Trust architecture implementation • AI-powered attack vectors and defenses • Critical infrastructure protection strategies Each whitepaper is freely accessible and represents cutting-edge research from trusted sources.
Whether you're starting a threat intelligence program or looking to mature existing capabilities, these resources provide practical guidance. From government frameworks to vendor research, you'll find implementation strategies that can be applied immediately. We regularly update this collection to ensure you have access to the most current and relevant cybersecurity research available.
Continue your research with these related articles.

Annual analysis of ransomware landscape and what to expect.
Read More
How DNS-level blocking improves your security posture.
Read More
From zero to mature: Steps to effective TI capability.
Read MoreSubscribe to receive new research and guides when they're published.