Merge pull request #198 from referefref/patch-2

Add jamesbrine.com.au CTI feed to threat intelligence feeds with description.
This commit is contained in:
Herman Slatman 2021-07-05 20:52:56 +02:00 committed by GitHub
commit 201ceda8b6
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -316,6 +316,13 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
</td>
</tr>
<tr>
<td>
<a href="https://jamesbrine.com.au" target="_blank">James Brine Threat Intelligence Feeds</a>
</td>
<td>
JamesBrine provides daily threat intelligence feeds for malicious IP addresses from internationally located honeypots on cloud and private infrastructure covering a variety of protocols including SSH, FTP, RDP, GIT, SNMP and REDIS. The previous day's IOCs are available in STIX2 as well as additional IOCs such as suspicious URIs and newly registered domains which have a high probaility of use in phishing campaigns.
</td>
</tr>
<tr>
<td>
<a href="https://support.kaspersky.com/datafeeds" target="_blank">Kaspersky Threat Data Feeds</a>
@ -336,7 +343,6 @@ Continuously updated and inform your business or clients about risks and implica
<td><a href="http://malc0de.com/bl/">Malc0de DNS Sinkhole</a></td>
<td>The files in this link will be updated daily with domains that have been indentified distributing malware during the past 30 days. Collected by malc0de.</td>
</tr>
</tr>
<tr>
<td>
<a href="https://maldatabase.com/" target="_blank">Maldatabase</a>