Follow

What sources are used for vulnerability scans (e.g. NVD, MITRE)? | Scanning FAQ

Alert Logic® uses the following sources:

  • 8ack.de
  • Action Fraud
  • Alert Logic internal sources: Marketing, SOC, Corporate Security
  • Alien Vault Open Threat Exchange
  • Apache
  • Arbor Networks
  • CERT
  • CISP (Including CIMBL (CERT-EI identified malicious blacklist))
  • Cisco
  • ClearSkySec
  • ClickToSecurity
  • Comodo Antispam
  • Cyphort
  • Deep End Research
  • Deepviz
  • Dynamoos Blog
  • ESET
  • Established contacts in LEA and government agencies
  • Exploit Database
  • F-Secure
  • FBI (Infragard)
  • Fidelis
  • FireEye
  • Flexera
  • GitHub
  • Google
  • Heimdal Security
  • Hybrid Analysis
  • IBM
  • IBM X-Force Exchange
  • ISC (SANS)
  • InfoWorld
  • Internet Identity
  • Launchpad
  • LinuxSecurity CIS
  • MITRE
  • MalwareBytes
  • Malware for Me
  • Malware Hunter Team
  • Malware Must Die
  • Malware Traffic Analysis
  • Malwr
  • Microsoft
  • Moreover Technologies
  • My Online Security
  • NIST
  • National Vulnerability Database
  • Novell
  • OSINT
  • OSVDB
  • OpenPhish
  • Open Threat Exchange (as per Alien Vault above)
  • PC World
  • PWC
  • Palo Alto Networks
  • PasteBin
  • Pentest
  • Phish Tank
  • phpBB
  • Proofpoint
  • RPW
  • Recorded Futures
  • Red Hat
  • Redsky (Wapack)
  • SANS Institute
  • Secure List
  • SecurityFocus
  • Sucuri
  • Symantec
  • Talos Security Group
  • Team Cymru
  • Tech Help List
  • TechWeek Europe
  • Threat Connect
  • Threat Scout
  • Threat Universe
  • Topix
  • Trend Micro
  • Twitter
  • US Cert
  • Ubuntu
  • VMWare
  • Virus Total
  • W3C
  • Wapack Labs
  • Wired
  • Yahoo
  • ZeusTracker
  • ZDNet
Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

0 Comments

Please sign in to leave a comment.