Threat Intelligence (TI) fetches information and insights about existing or potential cyber threats and risks from various sources. It then assembles, processes and analyzes the fetched information and uses it to predict data breaches, vulnerable attacks and any evidence of pre-planned attacks or threats and notifies about it in real-time. You can also link custom threat data sources and fetch and analyze their logs.
Supported Sources
Emerging Threats
Critical Stack
CSIS
Custom CSV
MISP
Blueliv
Recorded Future
StixTaxii
Threat Intelligence Components
ThreatIntelligence
ti
LP_Threat Intelligence
LP_Threat Intel Internal Machine Connecting to Multiple IOCs
LP_Threat Intel Excessive Denied Connections Attempt from IOC
LP_Threat Intel Connections with Suspicious Domains
LP_Threat Intel Allowed Connections from Suspicious Sources
LP_Threat Intel IOC Connecting to Multiple Internal Machines
We are glad this guide helped.
Please don't include any personal information in your comment
Contact Support