Threat Intelligence Feeds

We have been in the business for some time, and we know that getting the right threat intelligence feed can be a hurdle and expensive if done incorrect. We want to help you forward. Here are the best (cyber) threat intelligence feeds you can use today.

  • Why Data Breach Report Feeds Are Important

    Why Data Breach Report Feeds Are Important

    Written by

    — in

    ThreatIntelligenceLab.com

    Data Breach Reports stand out for their direct impact on enhancing cybersecurity teams. These reports, which detail incidents of data compromise within organizations, are not merely records of failure. Instead, they serve as vital notifications that can help prevent future breaches by informing us about the types of data targeted and the methods used by…

  • The Top 10 Essential Log Sources for IT Monitoring

    The Top 10 Essential Log Sources for IT Monitoring

    Written by

    — in

    ThreatIntelligenceLab.com

    This guide delves into the top 10 log sources that should be on your radar, each playing a vital role in fortifying your IT infrastructure. In my journey as an IT and network security professional, I’ve navigated through a complex sea of log sources. Identifying which logs to prioritize can often feel like a burden.…

  • Dark Web Cybercrime Forums You Should Monitor

    Dark Web Cybercrime Forums You Should Monitor

    Written by

    — in

    ThreatIntelligenceLab.com

    It may appear daunting due to the abundance of cybercrime forums and channels, but many of these are actually filled with noise, scams, and low sophistication actors posing minimal threat to corporate environments. Here we will discuss the the top 4 dark web cybercrime forums you should monitor. These are: The challenge for many companies…

  • How to Parse and Use VirusTotal feeds

    How to Parse and Use VirusTotal feeds

    Written by

    — in

    ThreatIntelligenceLab.com

    The next one, is one we love – it is Virustotal. This platform provides a malware gold mine and is filled with information that you can use to enhance your cybersecurity teams and services. Let’s take a look at the services we are interested in. These are: VirusTotal Intelligence: What can you expect If you…

  • Getting The Most Out Of URLscan.io

    Getting The Most Out Of URLscan.io

    Written by

    — in

    ThreatIntelligenceLab.com

    Oh, we always get happy when we think and work with URLscan.io. This platform is a great threat hunting platform, and you must know them. They actually call themselves ‘A sandbox for the web’. On the platform, phishing attacks (webpages and URLs) are being indexed after they have been scanned by the URLscan service. Major…

  • Abuse.Ch T.I. Feeds Are Good

    Abuse.Ch T.I. Feeds Are Good

    Written by

    — in

    ThreatIntelligenceLab.com

    For those that have been in the cyber threat intelligence field for a while, the service Abuse.ch is no stranger. But if you are not familiar with them, this is your chance to get a good view on what they offer and how you can get the most out of their services. The abuse.ch community…

  • Getting The Best From Alienvault OTX

    Getting The Best From Alienvault OTX

    Written by

    — in

    ThreatIntelligenceLab.com

    Most of you most likely already are familair with Alienvault, but did you know they also have a dedicated threat intelligence sharing platform dubbed “Alienvault OTX”? Well, this platform has been around for some while now, and it is one of the threat intelligence feeds we want you to be aware of. We can argue…