Threat Management
cybersecurity

Other Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.

Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.

A free and open-source OSINT framework for gathering and analyzing data from various sources

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.

OpenPhish provides real-time phishing trends, detecting new phishing URLs and targeting various brands.

A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.

A cybersecurity tool for managing data points and cyber threat indicators with a focus on neo4j data traversal.

A cybersecurity tool with online demo, mailing list, and multiple installation methods.

Tool for dataviz and statistical analysis of threat intelligence feeds, presented in cybersecurity conferences for measuring IQ of threat intelligence feeds.

An informational repo about hunting for adversaries in your IT environment.

A tracker that detects and logs SYN packets with a specific signature generated by the Mirai malware, providing real-time information on Mirai-based campaigns.

A system for collecting, managing, and distributing security information on a large scale, developed by CERT Polska.

Cisco Umbrella is a cloud security platform that offers protection against threats on the internet by blocking malicious activity.

OSTrICa Logo

OSTrICa

0 (0)

Open Source Threat Intelligence Collector with plugin-oriented framework.

Facilitates distribution of Threat Intelligence artifacts to defensive systems.

VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.

Dataplane.org is a nonprofit organization providing free data, tools, and analysis to increase awareness of Internet trends, anomalies, threats, and misconfigurations.

A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.

A community-driven project sharing detection logic, adversary tradecraft, and resources to make detection development more efficient, following MITRE ATT&CK structure.

CAPEC Logo

CAPEC

0 (0)

CAPEC™ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.

A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.

YETI Logo

YETI

0 (0)

Proof-of-concept implementation of TAXII services for developers and non-developers.

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.

A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.

Repository containing MITRE ATT&CK and CAPEC datasets in STIX 2.0 for cybersecurity threat modeling.

Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.

Free intelligence feeds for cybersecurity professionals to stay informed about emerging threats and trends.

Repository of Yara signatures for detecting targeted attacks on civil society organizations

MaxMind provides accurate IP geolocation and online fraud detection solutions to create safer digital experiences.

A nonprofit security organization that collects and shares threat data to make the Internet more secure.

ZoomEye Logo

ZoomEye

0 (0)

ZoomEye is an advanced cyberspace search engine that provides detailed information on cyberspace assets, including server software and version information, for cybersecurity experts, researchers, and enterprises.

A library of event-based analytics written in EQL to detect adversary behaviors, now integrated into the Detection Engine of Kibana.

secrepo Logo

secrepo

0 (0)

A repository of cybersecurity datasets and tools curated by @sooshie.

A comprehensive and unrestricted dataset of security incidents for research and decision-making

A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors.

The Cybersecurity and Infrastructure Security Agency (CISA) is a government agency that provides alerts, advisories, and resources to help protect the United States' critical infrastructure from cyber threats.

Open source web app for storing and searching Actor related data from users and public repositories.

Get insights into the latest cybersecurity trends and expert advice on enhancing organizational security.