Loading...
Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis. Task: Malware
Browse 32 security tools
Preemptive threat intelligence platform for incident response and hunting
Preemptive threat intelligence platform for incident response and hunting
DNS-layer threat protection blocking malware, phishing, and DNS attacks
DNS-layer threat protection blocking malware, phishing, and DNS attacks
Cloud-native DNS filtering solution that blocks malicious domains and threats
Cloud-native DNS filtering solution that blocks malicious domains and threats
AI-driven DNS security service blocking malicious domains and C2 servers
AI-driven DNS security service blocking malicious domains and C2 servers
Automated malware analysis and detection platform
File security solution detecting malware in non-executable documents
File security solution detecting malware in non-executable documents
Secure MFT with CDR malware protection for file transfers and storage
Secure MFT with CDR malware protection for file transfers and storage
Threat intelligence library with 30,000+ threats mapped to MITRE ATT&CK
Threat intelligence library with 30,000+ threats mapped to MITRE ATT&CK
Search engine for investigating exposed data across surface, deep, and dark web
Search engine for investigating exposed data across surface, deep, and dark web
Continuously updated threat indicator data streams via HTTPS protocol
Continuously updated threat indicator data streams via HTTPS protocol
Vulnerability threat intelligence platform with risk-based scoring and CVE/CWE data
Vulnerability threat intelligence platform with risk-based scoring and CVE/CWE data
CDR API for file sanitization via Content Disarm & Reconstruction
CDR API for file sanitization via Content Disarm & Reconstruction
Cloud-based protective DNS service blocking threats via threat intelligence
Cloud-based protective DNS service blocking threats via threat intelligence
DNS security service that blocks DNS-layer threats in real time
DNS security service that blocks DNS-layer threats in real time
Enterprise threat intelligence feeds covering malware, phishing, C2, and IPs
Enterprise threat intelligence feeds covering malware, phishing, C2, and IPs
DNS RPZ firewall blocking malicious domains at DNS layer using threat intel
DNS RPZ firewall blocking malicious domains at DNS layer using threat intel
Cyber threat intelligence feeds covering malware, phishing, C2s & more
Cyber threat intelligence feeds covering malware, phishing, C2s & more
Threat intelligence database with 500M+ malicious IPs, domains, and IOCs via API
Threat intelligence database with 500M+ malicious IPs, domains, and IOCs via API
DNS-layer threat blocking service with real-time threat intelligence feeds
DNS-layer threat blocking service with real-time threat intelligence feeds
Real-time C2 infrastructure detection and disruption threat intelligence feed
Real-time C2 infrastructure detection and disruption threat intelligence feed
Threat intelligence service providing alerts, analysis, and support
Threat intelligence service providing alerts, analysis, and support
A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.
A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.
Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.
Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.
Daily feed of bad IPs with blacklist hit scores for cybersecurity professionals to stay informed about malicious IP addresses.
Daily feed of bad IPs with blacklist hit scores for cybersecurity professionals to stay informed about malicious IP addresses.
Get strategic cybersecurity insights in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs