Some open source research on threat intelligence

1.*** Profile analysis
https://github.com/huifeidexingyuner/Hacker_analyse
2. Threat open source platform based on public information collection
https://github.com/NewBee119/Ti_Collector
Ti_Collector is Threat Intelligence Collector, mainly focusing on online public Reputation threat intelligence and event threat intelligence.
Reputation type threat intelligence mainly comes from the sharing of some security communities; incident type threat intelligence mainly comes from the consultation and sharing of security companies.
These threat intelligence data are automatically stored in the database after classification and processing by crawling means to build their own threat intelligence database.
At the same time, we provide a program to capture and query whether there are threats in the local DNS records.
3. Threat intelligence analysis platform and technical articles refer to
https://github.com/tianyulab/Threat_Hunting_with_ELK
4. Threat intelligence, malicious sample analysis, automated python scripts, open source Malware code collection, APT*** security cases related
https:// github.com/pandazheng/Threat-Intelligence-Analyst


Threat -intelligence focuses on collecting websites that release threat intelligence. In the process, you can also learn about the things that security companies do, product lines, services, etc., which will help you fully understand the overview of the industry.

Comprehensive consultation
https://www.hackread.com/hacking-news/ ***Look, more for some relatively fresh security consultation
https://github.com/kbandla/APTnotes collected APT from 2008 to the most recent In the event, someone maintains
https://badcyber.com, a website maintained by a group of people who want to become researchers and journalists, and collects several network security-related consultations every month.
http://securityaffairs.co/wordpress/ focuses on information security A foreign company consulted with a comprehensive subject classification
http://cysinfo.com/category/articles/ is a blog maintained by an open network security community, including security salons, training, and technology sharing https://citizenlab.ca/ category/research/ Canadian Citizen Lab, more interested in digital espionage
https://www.secureworks.com/blog/ The global leader in providing security solutions (DELL’s security team), the content of the blog is more macro https: //www.welivesecurity.com/ is similar to Freebuf in China, but prefers consulting
https://osandamalith.com/ mainly focusing on security technology and reverse technology
https://security.googleblog.com/ see name, no explanation

Cloud security
https://www.zscaler.com/blogs/research companies that provide cloud service security

Industrial Control Security
https://cyberx-labs.com/en/category/blog/ A company engaged in industrial control and the Internet of Things, its products support all industrial control protocols and advanced technology
https://www.dragos.com/blog. htmlA company that does industrial control security, its slogan is, Superheroes Don't do Infrastructure, That's why we're here
http://blog.senr.io/ A company specializing in embedded, IoT device security
https:/ /embedi.com/blog , a company that specializes in embedded device security
https://preossec.com/blog/ a company specializing in device firmware security analysis

Terminal security
https://www.cybereason.com/blog/ A blog provided by a foreign security company, mainly for terminal security
https://www.cylance.com/en_us/home.html A major for enterprise terminal security company of

Mobile security
https://blog.lookout.com a company mainly engaged in mobile phone security

Threat intelligence
https://www.recordedfuture.com/blog/ A company focused on threat intelligence, using machine learning and other technologies to extensively collect public and hidden threat intelligence
https://www.threatconnect.com/blog/ A security blog maintained by a foreign company for threat discovery and risk assessment
http://blog.jpcert.or.jp/ A Japanese company for emergency response
http://www.clearskysec.com/blog/ A foreign company only provides Security service companies, most articles will provide IOC
https://www.proofpoint.com/us/threat-insight A security consulting company in the United States, the article quality is relatively high
http://www.pwc.co. uk/issues/cyber-security-data-privacy.htmlA network security company in the United Kingdom, focusing on threat intelligence, data privacy protection, and emergency response
https://www.alienvault.com/blogs/labs-research Famous threats Intelligence community
https://www.malwarepatrol.net/onpatrol4malware-blog/ provides security consulting and threat intelligence

Traditional security
https://securelist.com/ Information security consulting maintained by Kaspersky, mostly sample analysis articles
https://blogs.technet.microsoft.com/mmpc/Security incidents provided by the Microsoft Malware Protection Center The blog
https://www.fireeye.com/blog/threat-research.html Fireeye provides a cyber threat blog. The blog is of high quality and detailed content.
http://baesystemsai.blogspot.co.uk/ A company in the UK does security testing. the company discovered threats, product line more comprehensive, large-scale
https://researchcenter.paloaltonetworks.com do a next-generation network security, foreign companies, more comprehensive product line
https://www.kaspersky.com/blog/ Kaspersky The security blog maintained by the base laboratory
https://www.arbornetworks.com/blog/asert/ The company that focuses on DDOS defense needs to*** https://securingtomorrow.mcafee.com/mcafee-labs maintained by Mcafee security laboratory Blog
https://heimdalsecurity.com/blog/posts/ A company engaged in the protection of digital assets and digital information
https://blog.checkpoint.com/The world's leading company focused on network security, the company's website is actually pink
https://labs.bitdefender.com/blog/ famous traditional anti-virus vendor
https://www.paloaltonetworks.com/resources doing cloud security, download The security vendor of the first generation firewall
https://blogs.cisco.com/talos The security threat blog maintained by the Cisco Talos team (Niu X team)
https://blog.talosintelligence.com/ or Talos
https://aws.amazon. com/cn/blogs/security/ Amazon's security blog
https://www.imperva.com/blog/ information security company, product coverage is very comprehensive, such as DDoS, data security, cloud security, etc.
http://blog.trendmicro. com/ Trend Micro Security Blog released
https://blog.fortinet.com/category/security-researchGlobal network security equipment provider
https://www.icebrg.io/blogA startup company focused on network traffic security analysis
http ://www.intezer.com/blog/ claims to introduce the concept of the human immune system into network security testing
https://www.forcepoint.com/blogAn integrated company engaged in cloud security, network security, etc.
https://www.crowdstrike.com/blog/category/threat-intel-research/ an integrated company providing security services
https://cofense.com/blog/ Starting from fighting against phishing websites, to providing commercial security solutions
https://www.symantec.com/connect/symantec-blogs/symantec-security-responseVeteran security company Symantec
https://www.carbonblack.com/ blog/ big data security, solve security problems from the perspective of data analysis

Guess you like

Origin blog.51cto.com/simeon/2535053
Recommended