From 8bc781dcc1610c3adfb1c4a8fec06727e48f045f Mon Sep 17 00:00:00 2001 From: Alexey Dolgikh <35637864+AlexZilber@users.noreply.github.com> Date: Tue, 4 Jun 2019 15:09:01 +0300 Subject: [PATCH] Update README.md change position --- README.md | 48 ++++++++++++++++++++++++------------------------ 1 file changed, 24 insertions(+), 24 deletions(-) diff --git a/README.md b/README.md index 7f98a53..1c0ec29 100644 --- a/README.md +++ b/README.md @@ -324,6 +324,14 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea + + + Kaspersky Threat Data Feeds + + +Continuously updated and inform your business or clients about risks and implications associated with cyber threats. The real-time data helps you to mitigate threats more effectively and defend against attacks even before they are launched. Demo Data Feeds contain truncated sets of IoCs (up to 1%) compared to the commercial ones + + Majestic Million @@ -584,14 +592,6 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea Mrlooquer has created the first threat feed focused on systems with dual stack. Since IPv6 protocol has begun to be part of malware and fraud communications, It is necessary to detect and mitigate the threats in both protocols (IPv4 and IPv6). - - - Kaspersky Threat Data Feeds - - -Continuously updated and inform your business or clients about risks and implications associated with cyber threats. The real-time data helps you to mitigate threats more effectively and defend against attacks even before they are launched. Demo Data Feeds contain truncated sets of IoCs (up to 1%) compared to the commercial ones - - ## Formats @@ -777,6 +777,14 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari Interflow is currently in private preview. + + + Kaspersky Threat Intelligence Portal + + + A website that provides a knowledge base describing cyber threats, legitimate objects, and their relationships, brought together into a single web service. Subscribing to Kaspersky Lab’s Threat Intelligence Portal provides you with a single point of entry to four complementary services: Kaspersky Threat Data Feeds, Threat Intelligence Reporting, Kaspersky Threat Lookup and Kaspersky Research Sandbox, all available in human-readable and machine-readable formats. + + Malstrom @@ -1012,14 +1020,6 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari The open, distributed, machine and analyst-friendly threat intelligence repository. Made by and for incident responders. - - - Kaspersky Threat Intelligence Portal - - - A website that provides a knowledge base describing cyber threats, legitimate objects, and their relationships, brought together into a single web service. Subscribing to Kaspersky Lab’s Threat Intelligence Portal provides you with a single point of entry to four complementary services: Kaspersky Threat Data Feeds, Threat Intelligence Reporting, Kaspersky Threat Lookup and Kaspersky Research Sandbox, all available in human-readable and machine-readable formats. - - @@ -1270,6 +1270,14 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly Jager is a tool for pulling useful IOCs (indicators of compromise) out of various input sources (PDFs for now, plain text really soon, webpages eventually) and putting them into an easy to manipulate JSON format. + + + Kaspersky CyberTrace + + + Threat intelligence fusion and analysis tool that integrates threat data feeds with SIEM solutions. Users can immediately leverage threat intelligence for security monitoring and incident report (IR) activities in the workflow of their existing security operations. + + KLara @@ -1551,14 +1559,6 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly Threat hunter based on osquery, Salt Open and Cymon API. It can query open network sockets and check them against threat intelligence sources - - - Kaspersky CyberTrace - - - Threat intelligence fusion and analysis tool that integrates threat data feeds with SIEM solutions. Users can immediately leverage threat intelligence for security monitoring and incident report (IR) activities in the workflow of their existing security operations. - -