SecurityIPAM Powers Internal Threat Intelligence – Using IP Address Management for Telemetry By Alex del Rio
SecurityWeak Security Controls and Practices Routinely Exploited for Initial Access By Michael Zuckerman
Cyber Threat IntelligenceExecutive Summary: VexTrio DDGA Domains Spread Adware, Spyware, and Scam Web Forms By Infoblox Cyber Intelligence Group