May 29, 2020

The Intelligence Cycle is the process of developing raw information into finished intelligence for policymakers to use in decision-making and action.

from The Federation of American Scientists (FAS)

Over the years, and all around the world, intelligence ag...

June 24, 2018

During May and the beginning of June I’ve presented my research about detecting phishing from passive DNS at several conferences in the US and Europe.

The abstract of the presentation is:

Passive DNS (pDNS) have been utilized by threat researchers for several years and a...

April 26, 2018

Before I've started, I used to Run Security Research for ThreatSTOP and during my last days there I had a rare opportunity to present a talk about running a security research department in a start up during @BSidesNYC.

Without thinking twice I suggested...

April 22, 2018

While I just got back the other day from Amsterdam from an amazing FIRST TC meeting (here is an awesome blog post summarizing the event by Xavier Mertens) where I had a sold out workshop session on Using DNS to your advantage, I am not resting and happy to announce the...

April 2, 2018

Compering between Google DNS, Quad9 and

March 31, 2018

I am happy to announce I will be teaching a class on "Hunting maliciousness using DNS" and also present my talk on "Detecting Phishing from pDNS" at the Security Fest conference in Gothenburg, Sweden May 31st (Training) and June 1st (the conference itself) - you should...

March 27, 2018

I've recently stumbled upon the new independent fund for women in tech (thanks for the pointer @shiftreduce) and I find this initiative amazing!

March 23, 2018

Welcome to the new website and blog!

This blog will contain information about research and analysis I conduct as well as information about where I am presenting it.

Looking forward to see you all here!


Please reload

Our Recent Posts

The (Cyber Threat) Intelligence cycle

May 29, 2020

Cicso IT Blog Award Noomine

December 10, 2018

Detecting phishing from pDNS

June 24, 2018

Please reload


Please reload



©2018 by Damsky - Cyber Threat Intelligence Research, Training and Consulting.