Security Solutions

Filter Security Solutions

NIST Cybersecurity Framework

Gaithersburg, MD, US
Verified Business

Framework providing incident response playbooks and cybersecurity best practices.

HUNTER Platform

San Ramon, CA, US
Verified Business

Threat hunting platform with pre-built queries and hypotheses for proactive detection.

Threat Hunting Queries

Sigma HQ

Berlin, BE, DE
Verified Business

Generic signature format for SIEM systems enabling cross-platform detection rules.

SIGMA Rules

Yara-Rules Project

San Francisco, CA, US
Verified Business

Community-driven repository of YARA rules for malware detection and classification.

YARA Rules

Dragos

Hanover, MD, US
Verified Business

Industrial cybersecurity platform protecting critical infrastructure and OT environments.

Critical Infrastructure Intelligence

Stratfor

Austin, TX, US
Verified Business

Geopolitical intelligence platform analyzing cyber risks from political events.

Geopolitical Risk Analysis

FS-ISAC

Reston, VA, US
Verified Business

Financial Services Information Sharing and Analysis Center for sector-specific threats.

Industry-Specific Threats

BrandShield

Hackensack, NJ, US
Verified Business

Online brand protection platform detecting phishing, counterfeits, and brand abuse.

Brand Protection Intelligence

crt.sh

Jersey City, NJ, US
Verified Business

Certificate transparency log search engine for monitoring SSL certificate issuance.

Certificate Transparency Logs

VirusTotal

Mountain View, CA, US
Verified Business

Google-owned service analyzing files and URLs for malicious content detection.

File Hash Databases

Cisco Talos

San Jose, CA, US
Verified Business

Threat intelligence organization providing IP and domain reputation data.

IP/Domain Reputation Services

MITRE ATT&CK

Bedford, MA, US
Verified Business

Globally accessible knowledge base of adversary tactics and techniques.

Attack Technique Documentation

Malwarebytes Labs

Santa Clara, CA, US
Verified Business

Malware research and analysis lab publishing threat intelligence and remediation guidance.

Malware Family Analysis

Digital Shadows

New York, NY, US
Verified Business

Digital risk protection platform monitoring and analyzing cyber campaigns and threats.

Campaign Tracking

Mandiant Intelligence

Reston, VA, US
Verified Business

Threat intelligence and incident response expertise tracking APT groups and campaigns.

Threat Actor Profiling

MITRE

Bedford, MA, US
Verified Business

Federally funded R&D center operating in the public interest across cybersecurity domains.

Security Research Organizations

VulnDB

McLean, VA, US
Verified Business

Commercial vulnerability database with detailed technical information and remediation guidance.

Asset-Specific Vulnerability Feeds

Vulners

Wilmington, DE, US
Verified Business

Vulnerability database and patch management intelligence platform with API access.

Patch Intelligence

Exploit Database

New York, NY, US
Verified Business

Archive of public exploits and vulnerable software maintained by Offensive Security.

Exploit Databases

Zerodium

Washington, DC, US
Verified Business

Premium zero-day acquisition platform paying researchers for high-impact vulnerabilities.

Zero-Day Research

China National Vulnerability Database

Beijing, Beijing, CN
Verified Business

Chinese national vulnerability database for security information sharing.

CVE Databases

Open Source Vulnerability Database

Walnut, CA, US
Verified Business

Independent open source vulnerability database project.

CVE Databases

Full Disclosure

Mountain View, CA, US
Verified Business

Public security mailing list for detailed vulnerability disclosure.

CVE Databases

Packet Storm Security

Wilmington, DE, US
Verified Business

Information security portal with exploits, advisories, and security tools.

CVE Databases