mirror of
https://github.com/hslatman/awesome-threat-intelligence.git
synced 2024-10-01 05:45:38 -04:00
commit
2f3d2f9028
24
README.md
24
README.md
@ -332,6 +332,14 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://support.kaspersky.com/datafeeds" target="_blank">Kaspersky Threat Data Feeds</a>
|
||||
</td>
|
||||
<td>
|
||||
Continuously updated and inform your business or clients about risks and implications associated with cyber threats. The real-time data helps you to mitigate threats more effectively and defend against attacks even before they are launched. Demo Data Feeds contain truncated sets of IoCs (up to 1%) compared to the commercial ones
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://majestic.com/reports/majestic-million" target="_blank">Majestic Million</a>
|
||||
@ -801,6 +809,14 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari
|
||||
Interflow is currently in private preview.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://www.kaspersky.com/enterprise-security/threat-intelligence" target="_blank">Kaspersky Threat Intelligence Portal</a>
|
||||
</td>
|
||||
<td>
|
||||
A website that provides a knowledge base describing cyber threats, legitimate objects, and their relationships, brought together into a single web service. Subscribing to Kaspersky Lab’s Threat Intelligence Portal provides you with a single point of entry to four complementary services: Kaspersky Threat Data Feeds, Threat Intelligence Reporting, Kaspersky Threat Lookup and Kaspersky Research Sandbox, all available in human-readable and machine-readable formats.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://github.com/byt3smith/malstrom" target="_blank">Malstrom</a>
|
||||
@ -1290,6 +1306,14 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly
|
||||
Jager is a tool for pulling useful IOCs (indicators of compromise) out of various input sources (PDFs for now, plain text really soon, webpages eventually) and putting them into an easy to manipulate JSON format.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://support.kaspersky.com/13850" target="_blank">Kaspersky CyberTrace</a>
|
||||
</td>
|
||||
<td>
|
||||
Threat intelligence fusion and analysis tool that integrates threat data feeds with SIEM solutions. Users can immediately leverage threat intelligence for security monitoring and incident report (IR) activities in the workflow of their existing security operations.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://github.com/KasperskyLab/klara" target="_blank">KLara</a>
|
||||
|
Loading…
Reference in New Issue
Block a user