Alert Logic® uses the following sources:
- 8ack.de
- Action Fraud
- Alert Logic internal sources: Marketing, SOC, Corporate Security
- Alien Vault Open Threat Exchange
- Apache
- Arbor Networks
- CERT
- CISP (Including CIMBL (CERT-EI identified malicious blacklist))
- Cisco
- ClearSkySec
- ClickToSecurity
- Comodo Antispam
- Cyphort
- Deep End Research
- Deepviz
- Dynamoos Blog
- ESET
- Established contacts in LEA and government agencies
- Exploit Database
- F-Secure
- FBI (Infragard)
- Fidelis
- FireEye
- Flexera
- GitHub
- Heimdal Security
- Hybrid Analysis
- IBM
- IBM X-Force Exchange
- ISC (SANS)
- InfoWorld
- Internet Identity
- Launchpad
- LinuxSecurity CIS
- MITRE
- MalwareBytes
- Malware for Me
- Malware Hunter Team
- Malware Must Die
- Malware Traffic Analysis
- Malwr
- Microsoft
- Moreover Technologies
- My Online Security
- NIST
- National Vulnerability Database
- Novell
- OSINT
- OSVDB
- OpenPhish
- Open Threat Exchange (as per Alien Vault above)
- PC World
- PWC
- Palo Alto Networks
- PasteBin
- Pentest
- Phish Tank
- phpBB
- Proofpoint
- RPW
- Recorded Futures
- Red Hat
- Redsky (Wapack)
- SANS Institute
- Secure List
- SecurityFocus
- Sucuri
- Symantec
- Talos Security Group
- Team Cymru
- Tech Help List
- TechWeek Europe
- Threat Connect
- Threat Scout
- Threat Universe
- Topix
- Trend Micro
- US Cert
- Ubuntu
- VMWare
- Virus Total
- W3C
- Wapack Labs
- Wired
- Yahoo
- ZeusTracker
- ZDNet
Comments
0 comments
Please sign in to leave a comment.