mirror of
https://github.com/hslatman/awesome-threat-intelligence.git
synced 2024-10-01 05:45:38 -04:00
commit
383711d6a5
12
README.md
12
README.md
@ -488,6 +488,14 @@ The primary goal of Malpedia is to provide a resource for rapid identification a
|
||||
PhishTank delivers a list of suspected phishing URLs. Their data comes from human reports, but they also ingest external feeds where possible. It's a free service, but registering for an API key is sometimes necessary.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://www.celerium.com/pickupstix" target="_blank">PickupSTIX</a>
|
||||
</td>
|
||||
<td>
|
||||
PickupSTIX is a feed of free, open-source, and non-commercialized cyber threat intelligence. Currently, PickupSTIX uses three public feeds and distributes about 100 new pieces of intelligence each day. PickupSTIX translates the various feeds into STIX, which can communicate with any TAXII server. The data is free to use and is a great way to begin using cyber threat intelligence.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://rescure.fruxlabs.com/" target="_blank">REScure Threat Intel Feed</a>
|
||||
@ -786,10 +794,10 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://www.dhs.gov/ais" target="_blank">AIS</a>
|
||||
<a href="https://www.cisa.gov/ais" target="_blank">AIS</a>
|
||||
</td>
|
||||
<td>
|
||||
The Department of Homeland Security’s (DHS) free Automated Indicator Sharing (AIS) capability enables the exchange of cyber threat indicators between the Federal Government and the private sector at machine speed. Threat indicators are pieces of information like malicious IP addresses or the sender address of a phishing email (although they can also be much more complicated).
|
||||
The Cybersecurity and Infrastructure Security Agency (CISA) free Automated Indicator Sharing (AIS) capability enables the exchange of cyber threat indicators between the Federal Government and the private sector at machine speed. Threat indicators are pieces of information like malicious IP addresses or the sender address of a phishing email (although they can also be much more complicated).
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
|
Loading…
Reference in New Issue
Block a user