CEWL (CVE Early Warning List) is the list of CVEs that threat actors are currently using or imminently about to use. With CVE threat intelligence CTCI see 10x more than any other threat intelligence company in the world, and our intelligence is timely, with many of our CVEs added on the day of the CVE release. We answer one of the most challenging questions, is this CVE something I should prioritize?
LiFT your security operations detections with the latest threat actor TTP Rules. Use these detections to detect or stop your organization from these unwanted attacks.
We have Sigma, Yara, WAF Rules, and various IOCs that can be leveraged in multiple security tools. These rules are optimized to reduce the computing need in tools like Splunk, DEVO, Elastic Search, and other SIEM tools.
It is expected as a business owner on the web to seek to investigate an IP address and verify if it is safe to interact with your system or not. The problem is that most IOC threat feeds are full of false positives. And don't provide historical context. LEGIT's purpose is to provide a historical timeline and search history that lists an IP address and its number of attacks.
Malicious history of IP Addresses from 400+ lists over seven years and it's free to use!