Phenomenati
Phenomenati
  • Home
  • The Future
    • Cyber Entropy™
    • The Decisive SOC
    • Augmented Intelligence
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Essential Reading/Viewing
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Industry ISACs
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • IOC Scanning
    • Analytics
    • Rootkit Detection
    • Incident Response
    • DFIR Resources
  • More
    • Home
    • The Future
      • Cyber Entropy™
      • The Decisive SOC
      • Augmented Intelligence
      • A SOC Taxonomy
    • Services
      • Cyber101 for the Board
      • Cyber Risk Assessments
      • Cyber ShadowBreaker™
      • Cybersecurity Strategy
      • Cybersecurity Design
      • Risk Level Agreements
      • SecOps Communications
      • Case Studies
    • Partners
      • Technology Vendors
      • Service Providers
    • About
      • Leadership
      • Contact Us
    • Resource Center
      • Essential Reading/Viewing
      • Frameworks, Standards
      • Threat Intel & Dashboards
      • Industry ISACs
      • Cyber Reconnaissance
      • Vulnerability Management
      • Scanning & Pen Testing
      • Monitoring, IDS, SIEM
      • IOC Scanning
      • Analytics
      • Rootkit Detection
      • Incident Response
      • DFIR Resources
  • Home
  • The Future
    • Cyber Entropy™
    • The Decisive SOC
    • Augmented Intelligence
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Essential Reading/Viewing
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Industry ISACs
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • IOC Scanning
    • Analytics
    • Rootkit Detection
    • Incident Response
    • DFIR Resources

Resource Center

A collection of useful Resources for Cyber Security Operations practitioners, or those building/evolving a SOC.

Cyber Threat Intelligence Resources

U.S. DNI Worldwide Threat Assessment 2019 


ActorTrackr

Alerts @ US-CERT

Alerts on ICS @ ICS-CERT

Apility.io

APT Groups and Ops

ASNs w/ Malicious Activity

AutoShun

BGP Ranking (from circl.lu)

C1fApp

C2 IP addrs (from John Bambenek)

Check Point's ThreatCloud

Critical Stack Intel

Cyber Threat Alliance (CTA)

CyBot threat intel chat bot

Cymon by eSentire

Deepviz Threat Intel

DHS AIS

DNS Trails (historical archive)

Dragos' Bob Lee on CTI

Emerging Threats Firewall Rules

Emerging Threats IDS Rules

ExploitAlert Statistics

Facebook ThreatExchange

FireHOL IP Lists

Google APT Search Engine

Grey Noise (scanners)

Hail a TAXII

I-Blocklist

IBM X-Force Exchange

Intel Threat Dashboard

IntelMQ threat intel consolidation platform

MalwareDomains.com

Malware Domain List

McAfee Threat Activity

Metadefender.com

MineMeld threat intel platform

Minotaur (threat research)

MISP threat sharing platform

UK National Cyber Security Centre (NCSC)

NetLab OpenData Project

NormShield

OpenIOC threat sharing framework from FireEye

OpenPhish Feeds

OTX - Open Threat Exchange from AlienVault

PhishTank

PulseDive threat intel platform

SANS Internet Storm Center

SANS Suspicious Domains

Sotra Edge (basic)

Spamhaus

STAXX from Anomali

Strongarm by Percipient

Symantec Security Response

Threat Hunting Academy

ThreatCrowd

ThreatExchange (by Facebook)

ThreatMiner

TOR Relay Lookup

TrendMicro's Threat Encyclopedia

VirusShare

X-Force Exchange (by IBM)

Yara-Rules

Cyber Threat Dashboards

 

Akamai's Global Client Reputation

Arbor Networks Digital Attack Map

Blueliv Threat eXchange

C1fApp Threat Map

Check Point's Cyber Threat Map

Deteque Botnet Map

FireEye Cyber Threat Map

Fortiguard's Cyber Threat Map

Grey Noise (maps of scanners)

Google/Arbor Digital Attack Map

HTTPCS Cyber Attack Map

IBM X-Force Exchange

Kaspersky Cyberthreat Map

LookingGlass Threat Map

Malwaretech's Intel Map(s)

Norse's Cyber Threat Map

Pixalate Cyber Threat Map

Security Wizardry CTI Board

Shodan ICS Radar

Shodan Maps

Shodan 2000

Skycure Threat Map

Talos Intelligence Dashboard

Threatbutt Attack Map

ThreatExpert Map

ThreatMetrix CyberCrime Threat Map

TrendMicro's Botnet Map

TrendMicro's Spam Map

World's Biggest Data Breaches

Xcitium Threatmap

Copyright © 2023 Phenomenati - All Rights Reserved.


This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept