A daily updated summary of the most frequent types of security advisories currently being reported from different sources. For more information, please check out the documentation here. Sources: US-CERT - United States Computer Emergency and Readiness Team. MA-CERT - Moroccan Computer Emergency Response Team. CERT-FR - The French national government Computer Security Incident Response Team. IBM X-Force Exchange - A cloud-based threat intelligence platform that allows to consume, share and act on threat intelligence. ZeroDayInitiative - An international software vulnerability initiative that was started in 2005 by TippingPoint. OBS Vigilance - An initiative created by OBS (Orange Business Services) since 1999 to watch public vulnerabilities and then offer security fixes, a database and tools to remediate them. VulDB - Number one vulnerability database documenting and explaining security vulnerabilities, threats, and exploits since 1970. HK-CERT - Hong Kong Computer Emergency Response Team Coordination Centre. CA-CCS - Canadian Centre for Cyber Security. EU-CERT - European Union Agency for Cybersecurity. Suggest a source by one of the above.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity
Forager is a threat intelligence tool that simplifies the retrieval, storage, and maintenance of threat data with a user-friendly interface and support for various data sources.
A digital risk protection platform that combines threat intelligence, dark web monitoring, attack surface management, brand protection, and supply chain intelligence to detect and respond to external cyber threats.
CyBot is a free and open source threat intelligence chat bot with a community-driven plugin framework.
Hippocampe is a threat feed aggregator with configurable confidence levels and a Hipposcore for determining maliciousness.
AbuseIPDB offers tools and APIs to report and check abusive IPs, enhancing network security.
HYAS Insight is a threat intelligence platform that provides infrastructure intelligence and cyber threat hunting capabilities for security operations, fraud investigations, and adversary profiling.
ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.