NECOMA addresses the aspect of data collection, leveraging past and current work on the topic with the goal to expand these existing mechanisms and orient them towards threat data analysis. It also focuses on threat data analysis from the perspective of understanding attackers and vulnerabilities, as well as from the point of view of the target and victim, needing to protect itself in real-time and in the most efficient manner possible. Additionally, NECOMA aims to develop and demonstrate new cyberdefense mechanisms that leverage metrics for deployment and evaluation, analyzing both infrastructure (networks and large computing infrastructures) and endpoints (smartphones and browsers). The results of the NECOMA project will be showcased in demonstrators that highlight the innovations of the project and prepare exploitation.
FEATURES
ALTERNATIVES
A command-line tool that fetches known URLs from various sources to identify potential security threats and vulnerabilities.
A summary of the threat modeling posts and final thoughts on the process
In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.
Automatically curate open-source Yara rules and run scans with YAYA.
The FASTEST Way to Consume Threat Intelligence and make it actionable.
AbuseHelper is an open-source framework for receiving and redistributing abuse feeds and threat intel.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.