It now has more than 65,000 participants in 140 countries, who contribute over 14 million threat indicators daily. A list of contributors banded together to build and maintain the APT Groups and Operations spreadsheet.ĪlienVault – Open Threat Exchange (OTX). AlienVault OTX provides open access to a global community of threat researchers and security professionals. We needed a decoder ring in our Advance Persistent Threat (APT) work. With all the blogging and rush to report, we’ve has situations where two different companies would be talking about the same problem with totally different labels. This list is one example of the spirit of the Internet.ĪPT Groups and Operations. People are surprised at the breadth and volume of the collaboration and sharing that happens to protect the Internet. Many of these resources are invaluable to the security investigator. There are several groups on the Internet who provide a portal that directly accesses Security Threat Intelligence or will E-mail reports when they see issues on your network. It is recommended that people seeking open source threat intel, security, and other data sets review all list to find the “hidden nuggets.” It is the experience of the editor that broad explorations yield the best results. At the end of this document, you will find links to other sources. Note – This one of several lists of open source threat intelligence and security data source list. This resource is one tool to prevent this type of abuse. We have found cases where people have taken open source community data provided for the best interest of the Internet and then sold it to governments who paid a huge sum. The most obvious is to “check the credibility” of any security vendor that claims “special security data” and then offer it to the Operator at a special price. The links and data can be used in many ways. It provides a list of the resources, activities, groups, and organizations. The following list of open source threat intelligence feeds is maintained for the participants of the Operator’s Security Toolkit program. The following is maintained for the participants of the Operator’s Security Toolkit program. The result is a massive amount of information. Finally, there are security companies who offer their threat intelligence as a community service. We also have an emerging market of companies who pull all this and other data into Threat Intelligence solutions. There are community projects which aggregate data from new sources of threat intelligence. Many companies offer freemium services to entice the usage of their paid services. We have new sources being offered all the time. The community of open source threat intelligence feeds has grown over time.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |