Threat Intelligence

Get Started. It's Free
or sign up with your email address
Rocket clouds
Threat Intelligence by Mind Map: Threat Intelligence

1. Analyst Tools

1.1. Anomali

1.2. Dispel.io

1.3. EclecticIQ

1.4. IBM i2 Analyst’s Notebook

1.5. Kaspersky

1.6. Paterva’s Maltego

1.7. Spiderfoot

1.8. SwordEye

1.9. ThreatConnect

1.10. ThreatQuotient

1.11. ThreatStop

2. Anti-Phishing/Spam

2.1. Area 1 Security

2.2. ChaosReigns

2.3. Cyren

2.4. DomainTools

2.5. Malwarebytes

2.5.1. hpHosts

2.5.1.1. https://hosts-file.net/

2.6. OpenPhish

2.7. PhishMe

2.8. PhishTank

2.9. RiskIQ

2.10. SegaSec

2.11. SentryBay

2.12. SpamRats

2.13. uceprotect.net

3. Brand Monitoring

3.1. ACID Technologies

3.2. Blueliv

3.3. BrandProtect

3.4. Digital Shadows

3.5. Recorded Future

3.6. Risk Based Security

3.7. RiskIQ

3.8. SpyCloud

4. Breached Credential Data

4.1. citadel.pw

4.2. haveibeenpwned.com

4.3. Kela Intelligence

4.4. Resecurity

4.5. Spycloud

5. Deep/Dark Web Monitoring

5.1. AlertLogic

5.2. AlienVault

5.3. CloudSek

5.4. Dark Shadows

5.5. DashLane

5.6. DigitalStakeout

5.7. Experian

5.8. Groupsense

5.9. Kela Intelligence

5.10. MarkMonitor

5.11. MassiveAlliance

5.12. Phishlabs

5.13. Recorded Future

5.14. Resecurity

5.15. Sovereign Intelligence

5.16. SpyCloud

5.17. Terbiumlabs

5.18. TruthFinder

5.19. WebHose.io

6. External Asset Discovery/Monitoring

6.1. Assetnote.io

6.2. CyberInt

6.3. Expanse

6.4. Kela Intelligence

6.5. Pwnieexpress

6.6. Randori

6.7. ReSecurity

6.8. RiskIQ

6.9. Secapps

7. Feeds

7.1. Advertising Blocklists

7.1.1. Malwarebytes

7.1.1.1. hpHosts

7.1.1.1.1. https://hosts-file.net/

7.1.2. Systcl.org

7.2. Command and Control (C&C)

7.2.1. Cybercrime Tracker

7.2.2. LookingGlass

7.2.3. Proofpoint

7.2.4. ReSecurity

7.3. DNS DGA Feeds

7.3.1. Farsight Security

7.3.2. Bambenekconsulting

7.4. File Reputation

7.4.1. Findthatfile

7.4.2. Webroot

7.5. IP Reputation

7.5.1. ChaosReigns

7.5.2. Cyren

7.5.3. Kittenlasers

7.5.4. WebRoot Brightcloud

7.6. IP/Domain Block Lists

7.6.1. Abuse.ch

7.6.2. Asprox

7.6.3. Autoshun

7.6.4. Badips

7.6.5. Bambenek Consulting

7.6.5.1. http://osint.bambenekconsulting.com/feeds/dga-feed.txt

7.6.6. Binary Defense Systems

7.6.7. Blocklist.de

7.6.8. Carbonite

7.6.8.1. Acquired WebRoot

7.6.9. CI Army (CINS)

7.6.10. Cyren

7.6.11. FIREHOL

7.6.12. Greensnow

7.6.13. Malwarebytes

7.6.13.1. hpHosts

7.6.13.1.1. https://hosts-file.net/

7.6.14. Malwaredomains.com

7.6.15. MalwarePatrol

7.6.16. MVPSHosts

7.6.17. NoThink

7.6.18. ThreatCrowd

7.6.19. ThreatStop

7.7. Malicious URL

7.7.1. Cyren

7.7.2. Findthatfile

7.7.3. FIREHOL

7.7.4. Joxean

7.7.5. KnownSec

7.7.6. Malc0de.com

7.7.7. MalwareDomainlist.com

7.7.8. MalwarePatrol

7.7.9. StopBadware

7.7.10. VXVault

7.7.11. Webroot

7.8. Proxy Lists

7.8.1. FIREHOL

7.8.2. Proxylists.me

7.8.3. Spys.ru

7.9. Tor Exit Nodes

7.9.1. Dan.xxx

7.10. Zero-Day Feeds

7.10.1. ExodusIntel

7.10.2. Zerodium

7.11. Domain Categories

7.11.1. Zvelo

7.11.2. shallalist.de

7.11.3. Netstar, Inc

7.11.4. Unveiltech

7.11.5. Symantec

7.11.5.1. https://www.symantec.com/products/rulespace

7.11.6. Carbonite (Formerly Webroot)

7.11.6.1. BrightCloud

7.11.7. Kaspersky

7.11.7.1. https://www.kaspersky.com/web-filter

7.11.8. Blacklist UT1

7.11.8.1. http://dsi.ut-capitole.fr/blacklists/index_en.php

8. Fraud

8.1. Groupsense

8.2. Internet Fraud Alert

8.2.1. http://www.ifraudalert.org/default.aspx

8.3. Malwarebytes

8.3.1. hpHosts

8.3.1.1. https://hosts-file.net/

8.4. National Cyber-Forensics and Training Alliance

8.4.1. http://www.ncfta.net/Index.aspx

8.5. ReSecurity

8.6. ThreatMetrix

9. Indicators of Compromise

9.1. CIRCL

9.1.1. https://www.circl.lu/services/misp-malware-information-sharing-platform/

9.2. FIREHOL

9.3. FireEye

9.4. Nullsecure

9.5. Proofpoint

9.5.1. Emerging Threats

9.6. Wapack labs

9.6.1. https://cms.wapacklabs.com/

9.6.2. ThreatRecon

9.6.2.1. https://threatrecon.co/

9.7. Malware Samples & Hashes

9.7.1. Abuse.ch

9.7.2. Malc0de.com

9.7.3. MalwareConfig

9.7.4. OPSWAT

9.7.5. ThreatCrowd

9.7.6. VirusSign

9.7.7. Virustotal

9.7.8. VXVault

10. Intelligence Portals

10.1. AlienVault

10.2. AlienVault OTX

10.3. Censys.io

10.4. Cymon

10.5. IBM Xforce

10.6. Passivetotal

10.7. Pulsedive

10.8. ThreatCrowd

10.9. ThreatMiner

10.10. ThreatStop

10.11. Virustotal

10.12. ZoomEye.org

11. IPS Signatures/Rules

11.1. Proofpoint

11.2. Snort.org

12. Predictive Intelligence

12.1. Seclytics

12.2. Sovereign Intelligence

13. Security Technology Intelligence Enrichment

13.1. Anomali

13.2. Blueliv

13.3. EclecticIQ

13.4. Google (VirusTotal)

13.5. Proofpoint Emerging Threats Intelligence

13.6. ThreatBook

13.7. ThreatConnect

13.8. ThreatQuotient

14. Social/Web Media Monitoring

14.1. BrandProtect

14.2. ClearBit

14.2.1. https://clearbit.com/reveal

14.3. Digital Shadows

14.4. Recorded Future

14.5. ReSecurity

14.6. ZeroFOX

15. Threat Actor Intelligence

15.1. Blueliv

15.2. CrowdStrike

15.3. Digital Shadows

15.4. FireEye

15.5. Flashpoint

15.6. Intel 471

15.7. Kaspersky

15.8. Kela Intelligence

15.9. Recorded Future

15.10. ReSecurity

15.11. Sovereign Intelligence

16. Threat Intelligence Analyst Outsourcing

16.1. Digital Shadows

16.2. Flashpoint

16.3. Intel 471

16.4. Kela Intelligence

17. Vulnerability Research

17.1. Telus Security Labs

17.1.1. http://telussecuritylabs.com/signatures/attack_detection

17.2. Vupen

17.2.1. http://www.vupen.com/english/services/tpp-index.php