Intelligence

Recent Security Solutions

NIST Cybersecurity Framework

Gaithersburg, MD, US
Verified Business

Framework providing incident response playbooks and cybersecurity best practices.

Playbooks & Runbooks

HUNTER Platform

San Ramon, CA, US
Verified Business

Threat hunting platform with pre-built queries and hypotheses for proactive detection.

Threat Hunting Queries

Sigma HQ

Berlin, BE, DE
Verified Business

Generic signature format for SIEM systems enabling cross-platform detection rules.

SIGMA Rules

Yara-Rules Project

San Francisco, CA, US
Verified Business

Community-driven repository of YARA rules for malware detection and classification.

YARA Rules

Dragos

Hanover, MD, US
Verified Business

Industrial cybersecurity platform protecting critical infrastructure and OT environments.

Critical Infrastructure Intelligence

Stratfor

Austin, TX, US
Verified Business

Geopolitical intelligence platform analyzing cyber risks from political events.

Geopolitical Risk Analysis

FS-ISAC

Reston, VA, US
Verified Business

Financial Services Information Sharing and Analysis Center for sector-specific threats.

Industry-Specific Threats

BrandShield

Hackensack, NJ, US
Verified Business

Online brand protection platform detecting phishing, counterfeits, and brand abuse.

Brand Protection Intelligence

crt.sh

Jersey City, NJ, US
Verified Business

Certificate transparency log search engine for monitoring SSL certificate issuance.

Certificate Transparency Logs

VirusTotal

Mountain View, CA, US
Verified Business

Google-owned service analyzing files and URLs for malicious content detection.

File Hash Databases

Cisco Talos

San Jose, CA, US
Verified Business

Threat intelligence organization providing IP and domain reputation data.

IP/Domain Reputation Services

MITRE ATT&CK

Bedford, MA, US
Verified Business

Globally accessible knowledge base of adversary tactics and techniques.

Attack Technique Documentation

Browse by Intelligence

Commercial Threat Intel Providers

Premium threat intelligence services

10 items

CVE Databases

Common vulnerabilities databases

9 items

Indicators of Compromise (IOCs)

Threat indicator feeds

0 items

IP/Domain Reputation Services

IP and domain threat scoring

1 item

Regional Threat Landscapes

Geography-specific threats

0 items

Security Research Organizations

Leading security research groups

1 item

Threat Intelligence Feeds

Real-time threat intelligence sources

0 items

File Hash Databases

Malicious file identification

1 item

Industry-Specific Threats

Sector-focused threat data

1 item

Open Source Intelligence (OSINT)

Publicly available threat data

10 items

Threat Actor Profiling

APT and cybercriminal tracking

1 item

Vulnerability Intelligence

Vulnerability research and databases

0 items

YARA Rules

Malware detection patterns

1 item

Zero-Day Research

Unknown vulnerability discovery

1 item

Campaign Tracking

Cyber attack campaign analysis

1 item

Certificate Transparency Logs

SSL certificate monitoring

1 item

Exploit Databases

Proof-of-concept exploits

1 item

Geopolitical Risk Analysis

Political cyber risk assessment

1 item

Industry-Specific Threat Feeds

Sector-focused threat intelligence

10 items

Research & Analysis

Security research and threat analysis

0 items

SIGMA Rules

SIEM detection rules

1 item

Brand Protection Intelligence

Brand abuse monitoring

1 item

Critical Infrastructure Intelligence

ICS/SCADA threat intelligence

1 item

Government & Military Sources

Official government threat data

10 items

Malware Family Analysis

Malware research and classification

1 item

Patch Intelligence

Security update tracking

1 item

Reputation & Risk Intelligence

IP, domain, and file reputation services

0 items

Threat Hunting Queries

Proactive threat detection

1 item

Asset-Specific Vulnerability Feeds

Targeted vulnerability data

1 item

Attack Technique Documentation

TTPs and MITRE ATT&CK mapping

1 item

Dark Web Monitoring

Underground threat intelligence

9 items

Geographic & Sector Intelligence

Regional and industry-specific threats

0 items

Playbooks & Runbooks

Response procedures

1 item

Supply Chain Risk Intelligence

Third-party risk assessment

0 items

Tactical Intelligence

Actionable threat indicators and rules

0 items