Cyber Cure provides free intelligence feeds, offering a valuable resource for cybersecurity professionals to stay informed about emerging threats and trends. Despite the current connection timeout error, the platform aims to facilitate threat intelligence sharing and collaboration. Note: The current error is a temporary issue with the website's hosting provider and Cloudflare, and it's recommended to try again in a few minutes or contact the hosting provider for resolution.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A set of configuration files to use with EclecticIQ's OpenTAXII implementation for MISP integration.
Provides advanced external threat intelligence to help organizations proactively identify and mitigate potential security threats.
A tool for extracting IOCs from various input sources and converting them into JSON format.
A serverless application for creating and monitoring URL tokens with threat intelligence and customizable alerts.
A simple, self-contained modular host-based IOC scanner for incident responders.
Unified repository for Microsoft Sentinel and Microsoft 365 Defender containing security content, detections, queries, playbooks, and resources to secure environments and hunt for threats.
Bearded Avenger is a cybersecurity tool with various integrations and deployment instructions available.
Real-time, container-based file scanning system for threat hunting and incident response.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.