![]() ![]() Virus List - Mailservers sending large amounts of viruses via Email Malware Hosting URL List - URL List of Known Bad Malware Mailservers Trusted Security Bad Reputation - Trusted Security Internet Reputation Threatcrowd C2 Servers - Malicious actors callback addresses from ThreatcrowdĪctive TOR Exit Nodes - List of fast changing TOR exit nodes SSL Known Proxies - A list of encrypted open proxy servers ![]() Web Proxy Server Abuse Monitoring - A known list of malicious proxy servers Proxy Server Abuse Monitoring - A known list of malicious proxy servers Ransomware Sources - A known list of ransomware sources Proxy Spy List - Proxy Servers used by hackers to steal informationĬonfirmed Proxy Servers - Proxy Servers used by hackers to steal information Open Proxy Servers - A reference to identify proxy servers with no access controls used by hackers Known Proxy Servers - A reference to identify proxy servers Known Malware Blogs - Analyst data ingested through our OSINT-X monitoring Message Board Spam Sources - Known Spammers Open Blacklist - An Open Source Blacklist of Threats Malware via IRC - Malicious Files served on IRC or C2 use of IRC Servers Malware via HTTP - Malicious Files served on Webservers Malware DNS - Malicious Files and Hash Sets HITRUST - HITRUST Threat Sharing Community - Members Only - Jigsaw Contributor Maxmind Proxy Fraud - Proxy servers used by fraud actors Malware Domain List - A list of known bad actors ![]() Malc0de Blocklist - A list of known bad actors Jigsaw Enterprise Platform - Use our data on your network to find threats in an automated process with customized dashboardsĪlienvault OTX - Public and Specific Information of InterestĪlienvault Blocklist - A list of known bad actors from Alienvault TAXII Server - You poll our Taxii server for Jigsaw and third party dataĬSV Download - Download update files in CSV Format for use in your own products and servicesĬloud Based Research Portal - Acces our cloud based search for indicator and threat intelligence data MISP Push Feed - We push data to your existing MISP instance NOTE: Government and Law Enforcement receive intelligence free of charge through our intelligence fusion center. The following feeds are available in our threat intelligence product. In addition for customers that have no security monitoring in place we can provide public facing DNS servers loaded with our RPZ feed to protect entire offices with a simple change of your DNS servers. This service allows our customers to utilize our threat intelligence product regardless of what systems they have deployed to protect their networks. Our SOC provides continuous, near real-time cyber security indicators and protections services to clients in various threat intelligence formats. Jigsaw Security Enterprise provides a threat intelligence capability through our Security Operations Center located in Raleigh, North Carolina. Jigsaw Intelligence Feed $49,995.95 MSRP Annual Subscription ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |