Breach Report Collection Logo

Breach Report Collection

Visit Website

A collection of companies that disclose adversary TTPs (Tactics, Techniques, and Procedures) after they have been breached, useful for analysis of intrusions launched by adversaries with measurable effects and impact. The collection includes a list of companies that have been breached, along with the breach date, adversary, and source of the information. The list includes well-known companies such as Microsoft, Cloudflare, Boeing, and many others, and provides valuable insights into the tactics and techniques used by adversaries.

FEATURES

ALTERNATIVES

Repository of Yara signatures for detecting targeted attacks on civil society organizations

Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.

Check if an IP address was used as a Tor relay on a given date.

QRadio is a tool/framework designed to consolidate cyber threats intelligence sources.

Automated framework for collecting and processing samples from VirusTotal with YARA rule integration.

A Linux distribution designed for threat emulation and threat hunting, integrating attacker and defender tools for identifying threats in your environment.

eCrimeLabs provides a SOAR platform for threat detection and response, integrated with MISP.

Python-based client for IBM XForce Exchange with an improved version available.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved