Sponsored by
Rapid7 Blog
Rapid7 report on new CVEs and blog on IR, threat detection, response and more.
Cyber threat intelligence is information about threats and threat actors that helps mitigate harmful events in cyberspace. Cyber threat intelligence sources include open source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web.
Rapid7 report on new CVEs and blog on IR, threat detection, response and more.
Run interactive malware analysis, download samples shared in our community, and organize retro hunting
Sharing indicators of compromise (IOCs) with the community and threat intelligence providers
Sharing malware distribution sites with the community, AV vendors and threat intelligence providers
Sharing malware samples with the community, AV vendors and threat intelligence providers
Report and find IP addresses that have been associated with malicious activity online
ATP Groups, Operations, TTPs and other information.
A countermeasure knowledge base, with semantically rigorous types and relations that define both the key concepts and the relations necessary to link those concepts to each other.
The ISC provides a free analysis and warning service to thousands of Internet users and organizations.
HackerOne is a vulnerability coordination and bug bounty platform that connects businesses with penetration testers and cybersecurity researchers.
Volexity is a security firm that assists organizations with incident response, digital forensics, trusted advisory, and threat intelligence.
Cybersecurity directives from the US Gov to patch systems etc
A sandbox for the web, scanner for suspicious and malicious URLs.
Analyze suspicious files and URLs to detect types of malware, automatically share them with the security community.
Investigate domains and IP addresses.
Aggregator for news about cybercrime, breaches, APTs and more.
Aggregates stories about hacking and security vulnerabilities.
Search for malicious IPs behind Cloudflare.
The Microsoft Security Response (MSRC) team identifies, monitors, responds to and resolves security incidents and vulnerabilities in Microsoft software. Go MSRC!
Cisco Talos Intelligence Group is one of the largest commercial threat intelligence teams in the world.
CrowdStrike provide cloud workload and endpoint security, threat intelligence, and cyberattack response services.
FireEye provide hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks.
General security analysis and research from Microsoft.
Network-orientated analysis and research from Cloudflare
UK-orientated general analysis and research from the National Cyber Security Centre.
Email/spam threat research from Proofpoint.
Open Threat Exchange is a crowd-sourced computer-security platform. It has more than 80,000 participants in 140 countries who share more than 19 million potential threats daily. It is free to use.
The MITRE ATT&CK framework is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s attack lifecycle and the platforms they are known to target.
The MITRE ATT&CK framework is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s attack lifecycle and the platforms they are known to target.
The MITRE ATT&CK framework is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s attack lifecycle and the platforms they are known to target.