Connecting the Dots in Cyber Threat Campaigns, Part 1: Domain Name WHOIS Information
There tends to be some mystery around how to properly analyze infrastructure used in cyber attacks. It is a bit of an art, often involving educated guesses to tie components together. However it is important to note the use of the term “educated guesses," as they’re bound by solid data. An educated guess is defined as “a guess b...