The Trystero Project is an experiment that measures the security efficacy of email providers against real-world emerging malware. It also provides various tools and resources for threat intelligence, including a reputation database, IOC database, and YARA rule generators. VMware Carbon Black provides endpoint protection and workload security solutions, including threat hunting and incident response, managed detection and response, and cloud workload protection.
FEATURES
ALTERNATIVES
Get insights into the latest cybersecurity trends and expert advice on enhancing organizational security.
A collection of Yara rules licensed under the DRL 1.1 License.
A modular malware collection and processing framework with support for various threat intelligence feeds.
PolySwarm is a malware intelligence marketplace that aggregates threat detection engines to provide early detection, unique samples, and higher accuracy.
A tool to extract indicators of compromise from security reports in PDF format.
Maltiverse automates Threat Intelligence for small and medium-sized SecOps teams, providing an effective and affordable service.
FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity
A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.