Breach Report Collection Logo

Breach Report Collection

0
Free
Visit Website

A collection of companies that disclose adversary TTPs (Tactics, Techniques, and Procedures) after they have been breached, useful for analysis of intrusions launched by adversaries with measurable effects and impact. The collection includes a list of companies that have been breached, along with the breach date, adversary, and source of the information. The list includes well-known companies such as Microsoft, Cloudflare, Boeing, and many others, and provides valuable insights into the tactics and techniques used by adversaries.

FEATURES

ALTERNATIVES

Open source web app for storing and searching Actor related data from users and public repositories.

Freely available network IOCs for monitoring and incident response

Taxii2 server for interacting with taxii services.

Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.

A cybersecurity tool for managing data points and cyber threat indicators with a focus on neo4j data traversal.

A collection of Yara rules licensed under the DRL 1.1 License.

A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.

DNSDumpster is a domain research tool for discovering and analyzing DNS records to map an organization's attack surface.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved