mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
928 lines
34 KiB
JSON
928 lines
34 KiB
JSON
{
|
||
"authors": [
|
||
"Various"
|
||
],
|
||
"category": "actor",
|
||
"description": "List of threat intelligence producer from security vendors to CERTs including any producer of intelligence at large.",
|
||
"name": "Producer",
|
||
"source": "MISP Project",
|
||
"type": "producer",
|
||
"uuid": "faab7b69-c850-491a-b36c-ba48c1c03279",
|
||
"values": [
|
||
{
|
||
"description": "Intel 471 provides adversary and malware intelligence for leading security teams. Our adversary intelligence is focused on infiltrating access to closed sources where threat actors collaborate, communicate and plan cyber attacks. Our malware intelligence leverages our adversary intelligence and underground capabilities to provide timely data and context on malicious infrastructure.",
|
||
"meta": {
|
||
"company-type": [
|
||
"Cyber Security Vendor"
|
||
],
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://intel471.com/"
|
||
],
|
||
"product-type": [
|
||
"intelligence-feed-provider"
|
||
],
|
||
"products": [
|
||
"Malware Intelligence",
|
||
"Vulnerability Intelligence"
|
||
],
|
||
"refs": [
|
||
"https://www.applytosupply.digitalmarketplace.service.gov.uk/g-cloud/services/448869643798857"
|
||
],
|
||
"synonyms": [
|
||
"Intel 471 Inc.",
|
||
"Intel 471"
|
||
]
|
||
},
|
||
"uuid": "306bc923-3200-47e3-ade9-50ffc41f668c",
|
||
"value": "Intel471"
|
||
},
|
||
{
|
||
"description": "Sophos Ltd. is a British-based security software and hardware company. It was listed on the London Stock Exchange until it was acquired by Thoma Bravo in February 2020",
|
||
"meta": {
|
||
"company-type": [
|
||
"Cyber Security Vendor"
|
||
],
|
||
"country": "UK",
|
||
"official-refs": [
|
||
"https://www.sophos.com/"
|
||
],
|
||
"product-type": [
|
||
"antivirus-vendor"
|
||
],
|
||
"products": [
|
||
"Endpoint"
|
||
],
|
||
"refs": [
|
||
"https://www.sophos.com/en-us/legal"
|
||
],
|
||
"synonyms": [
|
||
"Sophos LTD"
|
||
]
|
||
},
|
||
"uuid": "455b9e40-e8dd-443b-87b3-c70bd09b4231",
|
||
"value": "Sophos"
|
||
},
|
||
{
|
||
"description": "Group-IB is a creator of cybersecurity technologies to investigate, prevent and fight digital crime",
|
||
"meta": {
|
||
"company-type": [
|
||
"Cyber Security Vendor"
|
||
],
|
||
"official-refs": [
|
||
"https://www.group-ib.com/"
|
||
],
|
||
"product-type": [
|
||
"Threat Intelligence",
|
||
"Attack Surface Management",
|
||
"Fraud Protection",
|
||
"Digital Risk Protection",
|
||
"Managed XDR",
|
||
"Business Email Protection"
|
||
],
|
||
"products": [
|
||
"Unified Risk Platform"
|
||
],
|
||
"refs": [
|
||
"https://www.group-ib.com/about-us/"
|
||
]
|
||
},
|
||
"uuid": "21afba9e-cd2a-45c9-b421-b1f14fd181e9",
|
||
"value": "Group-IB"
|
||
},
|
||
{
|
||
"description": "Mandiant is an American cybersecurity firm and a subsidiary of Google.",
|
||
"meta": {
|
||
"company-type": [
|
||
"Information security"
|
||
],
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.mandiant.com/"
|
||
],
|
||
"product-type": [
|
||
"Proactive Exposure Management",
|
||
"Government",
|
||
"Digital Risk Protection",
|
||
" Ransomware Protection"
|
||
],
|
||
"products": [
|
||
"OpenIOC"
|
||
],
|
||
"refs": [
|
||
"https://en.wikipedia.org/wiki/Mandiant"
|
||
]
|
||
},
|
||
"uuid": "da5cdcd1-7b15-4371-b7eb-ca32916d2052",
|
||
"value": "Mandiant"
|
||
},
|
||
{
|
||
"description": "Thread intelligence provider focusing on data leaks",
|
||
"meta": {
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://spycloud.com"
|
||
],
|
||
"product-type": [
|
||
"Post-Infection Remediation",
|
||
"Ransomware Prevention",
|
||
"Automated ATO Prevention",
|
||
"Session Hijacking Prevention",
|
||
"Threat Actor Attribution",
|
||
"Fraud Prevention"
|
||
]
|
||
},
|
||
"uuid": "ad99da77-986b-45bc-a7b0-c1887dd55b59",
|
||
"value": "Spycloud"
|
||
},
|
||
{
|
||
"description": "DomainTools is a leading provider of Whois and other DNS profile data for threat intelligence enrichment.",
|
||
"meta": {
|
||
"company-type": [
|
||
"Threat Intelligence"
|
||
],
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.domaintools.com/"
|
||
],
|
||
"products": [
|
||
"Iris Intelligence Platform",
|
||
"Farsight DNSDB",
|
||
"Threat Intelligence Feeds"
|
||
],
|
||
"refs": [
|
||
"https://icannwiki.org/DomainTools"
|
||
]
|
||
},
|
||
"uuid": "993c6a36-b625-4a1f-8737-72ba5a197744",
|
||
"value": "Domaintools"
|
||
},
|
||
{
|
||
"description": "Feedly is an AI-powered news aggregator application for various web browsers and mobile devices running iOS and Android. It is also available as a cloud-based service.",
|
||
"meta": {
|
||
"official-refs": [
|
||
"https://feedly.com/homepage"
|
||
],
|
||
"product-type": [
|
||
"Threat Intelligence"
|
||
],
|
||
"refs": [
|
||
"https://en.wikipedia.org/wiki/Feedly"
|
||
]
|
||
},
|
||
"uuid": "4e7c737a-4912-488a-8571-1f9226ebad05",
|
||
"value": "Feedly"
|
||
},
|
||
{
|
||
"description": "Database of public networks, IP addresses and domain names owned by companies and organisations worldwide.",
|
||
"meta": {
|
||
"official-refs": [
|
||
"https://networksdb.io/"
|
||
],
|
||
"refs": [
|
||
"https://twitter.com/networksdbio"
|
||
]
|
||
},
|
||
"uuid": "17fec4c4-3822-4198-9735-cee04aa51305",
|
||
"value": "Networksdb.io"
|
||
},
|
||
{
|
||
"description": "Compagny providing comprehensive dataset of internet intelligence",
|
||
"meta": {
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://censys.com/",
|
||
"https://censys.io/"
|
||
],
|
||
"products": [
|
||
"Censys Search",
|
||
"Exposure Management",
|
||
"The Censys Internet Map",
|
||
"Integrations"
|
||
]
|
||
},
|
||
"uuid": "101ca178-12c8-4488-b234-93f263e30b1a",
|
||
"value": "Censys"
|
||
},
|
||
{
|
||
"description": "DomainIQ is an internet research tool providing information about a domain name, its owner, the server it's hosted on, its ownership history, similar domains and more.",
|
||
"meta": {
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.domainiq.com"
|
||
]
|
||
},
|
||
"uuid": "3f79697b-63d8-4c86-aabf-84df1f03c43d",
|
||
"value": "DomainIQ"
|
||
},
|
||
{
|
||
"description": "Computer and Network Security",
|
||
"meta": {
|
||
"company-type": [
|
||
"Computer and Network Security"
|
||
],
|
||
"country": "FI",
|
||
"official-refs": [
|
||
"https://www.arcticsecurity.com/"
|
||
],
|
||
"synonyms": [
|
||
"Arctic Security"
|
||
]
|
||
},
|
||
"uuid": "542f8890-128b-42ca-97f9-8fe2af7ab783",
|
||
"value": "Arctic"
|
||
},
|
||
{
|
||
"description": "BitSight is a cybersecurity ratings company that analyzes companies, government agencies, and educational institutions.",
|
||
"meta": {
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.bitsight.com"
|
||
]
|
||
},
|
||
"uuid": "1e98d9ac-0ef1-4046-bf9f-7c905a56ba90",
|
||
"value": "Bitsight"
|
||
},
|
||
{
|
||
"description": "RiskIQ, Inc. is a cyber security company that was based in San Francisco, California. It provided cloud-based software as a service (SaaS) for organizations to detect phishing, fraud, malware, and other online security threats. RiskIQ was acquired by Microsoft in July 2021.",
|
||
"meta": {
|
||
"company-type": [
|
||
"Cyber Security company"
|
||
],
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://community.riskiq.com/"
|
||
],
|
||
"product-type": [
|
||
"Threat detection"
|
||
],
|
||
"refs": [
|
||
"https://en.wikipedia.org/wiki/RiskIQ"
|
||
]
|
||
},
|
||
"uuid": "9f279581-5514-42cd-8011-05af9787ee37",
|
||
"value": "RiskIQ"
|
||
},
|
||
{
|
||
"description": "Sweepatic is a cybersecurity company",
|
||
"meta": {
|
||
"company-type": [
|
||
"Cyber Security vendor"
|
||
],
|
||
"country": "BE",
|
||
"official-refs": [
|
||
"https://www.sweepatic.com"
|
||
],
|
||
"product-type": [
|
||
"EASM platform"
|
||
]
|
||
},
|
||
"uuid": "c9bd796a-8b73-42ab-8abe-0016292f5528",
|
||
"value": "Sweepatic"
|
||
},
|
||
{
|
||
"description": "Team Cymru is an internet security firm that offers research services making the internet a more secure place.",
|
||
"meta": {
|
||
"company-type": [
|
||
"Cyber Security vendor"
|
||
],
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.team-cymru.com/"
|
||
],
|
||
"product-type": [
|
||
"Threat Intelligence Solutions",
|
||
"Attack Surface Management Solution",
|
||
"Threat Feeds"
|
||
],
|
||
"products": [
|
||
"Pure Signal™ Recon",
|
||
"Pure Signal™ Scout",
|
||
"Pure Signal™ Orbit",
|
||
"IP Reputation Feed",
|
||
"Controller Feed",
|
||
"Botnet Analysis & Reporting"
|
||
]
|
||
},
|
||
"uuid": "8a22c0b2-d05f-4142-ab74-ffdf38fe4758",
|
||
"value": "Team Cymru"
|
||
},
|
||
{
|
||
"description": "G Data CyberDefense AG (until September 2019 G Data Software AG) is a German software company that focuses on computer security.",
|
||
"meta": {
|
||
"company-type": [
|
||
"Computer software"
|
||
],
|
||
"country": "DE",
|
||
"official-refs": [
|
||
"https://www.gdata-software.com",
|
||
"https://www.gdatasoftware.co.uk"
|
||
],
|
||
"product-type": [
|
||
"Antivirus software",
|
||
"Mobile Device Management"
|
||
],
|
||
"products": [
|
||
"AntiVirus",
|
||
"InternetSecurity",
|
||
"TotalSecurity",
|
||
"AntiVirus for Mac",
|
||
"AntiVirus Business",
|
||
"AntiVirus Enterprise",
|
||
"ClientSecurity Business",
|
||
"ClientSecurity Enterprise",
|
||
"EndpointProtection Business",
|
||
"EndpointProtection Enterprise",
|
||
"MailSecurity",
|
||
"PatchManagement",
|
||
"Mobile Security",
|
||
"VPN"
|
||
],
|
||
"refs": [
|
||
"https://en.wikipedia.org/wiki/G_Data_CyberDefense"
|
||
],
|
||
"synonyms": [
|
||
"GDATA",
|
||
"G Data CyberDefense AG",
|
||
"G Data Software AG"
|
||
]
|
||
},
|
||
"uuid": "2b69f676-c875-4000-8350-5f162e69d908",
|
||
"value": "G DATA"
|
||
},
|
||
{
|
||
"description": "Sekoia.io is a European cybersecurity SAAS company, whose mission is to develop the best protection capabilities against cyber attacks.",
|
||
"meta": {
|
||
"company-type": [
|
||
"Cyber Security Vendor"
|
||
],
|
||
"country": "FR",
|
||
"official-refs": [
|
||
"https://www.sekoia.io"
|
||
],
|
||
"product-type": [
|
||
"eXtended Detection and Response SaaS platform"
|
||
],
|
||
"products": [
|
||
"SIEM RELOADED | Sekoia Defend",
|
||
"CTI RELOADED"
|
||
]
|
||
},
|
||
"uuid": "6c9ef130-7cf6-4eeb-9e65-46228fc5e30c",
|
||
"value": "Sekoia"
|
||
},
|
||
{
|
||
"description": "Excellium Services Group is a cyber-security consulting and technology Integration Company established since 2012 in Luxemburg and Belgium, with activities and in France and Africa.",
|
||
"meta": {
|
||
"company-type": [
|
||
"Cyber-security consulting and technology Integration Company",
|
||
"CSIRT"
|
||
],
|
||
"country": "LU",
|
||
"official-refs": [
|
||
"https://excellium-services.com"
|
||
],
|
||
"product-type": [
|
||
"CERT-XLM",
|
||
"SOC",
|
||
"GDPR Services",
|
||
"Information Security Governance",
|
||
"Intrusion Tests – Red Team (Application Security Team)",
|
||
"Network & Security Infrastructure",
|
||
"Training"
|
||
],
|
||
"products": [
|
||
"EyeGuard",
|
||
"EyeTools",
|
||
"EyeDeep",
|
||
"EyeTLD",
|
||
"EyeNotify"
|
||
]
|
||
},
|
||
"uuid": "73ae2776-3700-4120-84ae-7e9785e6071b",
|
||
"value": "Excellium"
|
||
},
|
||
{
|
||
"description": "Telindus is a brand of Proximus Luxembourg SA. Founded in 1979, Telindus Luxembourg accompanies all organizations in their digital transformation, by providing holistic ICT & Telecommunication solutions, as well as tailored support services. Our areas of expertise include Telecommunication Services, ICT Infrastructure, Multi-Cloud, Digital Trust Solutions, Cybersecurity, Business Applications, Managed Services and Training.",
|
||
"meta": {
|
||
"company-type": [
|
||
"Service Provider"
|
||
],
|
||
"country": "LU",
|
||
"official-refs": [
|
||
"https://www.telindus.lu/en"
|
||
],
|
||
"product-type": [
|
||
"Ethical Hacking",
|
||
"Infrastructure Security",
|
||
"Managed Security Services",
|
||
"Protection, Detection and Orchestration",
|
||
"Security Operations Center",
|
||
"Strategy, risk, management and advice",
|
||
"ICT solutions",
|
||
"Telecoms",
|
||
"Cloud"
|
||
]
|
||
},
|
||
"uuid": "4155eec3-fae2-4e80-a9a6-89b0f976851a",
|
||
"value": "Telindus"
|
||
},
|
||
{
|
||
"description": "Bleeping Computer is a website covering technology news and offering free computer help via its forums that was created by Lawrence Abrams in 2004. It publishes news focusing heavily on cybersecurity, but also covers other topics including computer software, computer hardware, operating system and general technology.",
|
||
"meta": {
|
||
"company-type": [
|
||
"Technology news and computer help"
|
||
],
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.bleepingcomputer.com/"
|
||
],
|
||
"product-type": [
|
||
"Security and Technology Blog Posts"
|
||
],
|
||
"refs": [
|
||
"https://en.wikipedia.org/wiki/Bleeping_Computer"
|
||
]
|
||
},
|
||
"uuid": "ec3fb9b0-4f24-4099-ad48-3e8f68e88275",
|
||
"value": "BleepingComputer"
|
||
},
|
||
{
|
||
"description": "Cisco Talos, or Cisco Talos Intelligence Group, is a cybersecurity technology and information security company based in Fulton, Maryland. It is a part of Cisco Systems Inc. Talos' threat intelligence powers Cisco Secure products and services, including malware detection and prevention systems. Talos provides Cisco customers and internet users with customizable defensive technologies and techniques through several of their own open-source products, including the Snort intrusion prevention system and ClamAV[3] anti-virus engine",
|
||
"meta": {
|
||
"country": "US",
|
||
"refs": [
|
||
"https://talosintelligence.com/",
|
||
"https://blog.talosintelligence.com/"
|
||
],
|
||
"synonyms": [
|
||
"Cisco Talos"
|
||
]
|
||
},
|
||
"uuid": "0adf6f0f-3795-4de1-9763-1bdd1c31a5d7",
|
||
"value": "Cisco Talos Intelligence Group"
|
||
},
|
||
{
|
||
"description": "Headquartered in The Hague, the Netherlands, Europol’s mission is to support its Member States in preventing and combating all forms of serious international and organised crime, cybercrime and terrorism. Europol also works with many non-EU partner states and international organisations.",
|
||
"meta": {
|
||
"country": "NL",
|
||
"official-refs": [
|
||
"https://www.europol.europa.eu/"
|
||
]
|
||
},
|
||
"uuid": "f6eae887-7ee4-4999-a909-5eef291c40cc",
|
||
"value": "Europol"
|
||
},
|
||
{
|
||
"description": "ESET, s.r.o., is a software company specializing in cybersecurity. ESET's security products are made in Europe and provide security software in over 200 countries and territories worldwide. Its software is localized into more than 30 languages. The company was founded in 1992 in Bratislava, Slovakia.",
|
||
"meta": {
|
||
"country": "SK",
|
||
"official-refs": [
|
||
"https://www.eset.com",
|
||
"https://www.welivesecurity.com"
|
||
]
|
||
},
|
||
"uuid": "3a43aca5-6366-4168-b182-a8afec4550b5",
|
||
"value": "ESET"
|
||
},
|
||
{
|
||
"description": "Tencent is a world-leading internet and technology company that develops innovative products and services to improve the quality of life of people around the world. Founded in 1998 with its headquarters in Shenzhen, China, Tencent's guiding principle is to use technology for good. Our communication and social services connect more than one billion people around the world, helping them to keep in touch with friends and family, access transportation, pay for daily necessities, and even be entertained. Tencent also publishes some of the world's most popular video games and other high-quality digital content, enriching interactive entertainment experiences for people around the globe. Tencent also offers a range of services such as cloud computing, advertising, FinTech, and other enterprise services to support our clients' digital transformation and business growth. Tencent has been listed on the Stock Exchange of Hong Kong since 2004.",
|
||
"meta": {
|
||
"country": "CN",
|
||
"official-refs": [
|
||
"https://www.tencent.com",
|
||
"https://mp.weixin.qq.com"
|
||
]
|
||
},
|
||
"uuid": "62e24285-103e-404e-b070-8b7fe59f5767",
|
||
"value": "Tencent"
|
||
},
|
||
{
|
||
"description": "Kaspersky Lab (/kæˈspɜːrski/; Russian: Лаборатория Касперского, romanized: Laboratoriya Kasperskogo) is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky and Alexey De-Monderik. Kaspersky Lab develops and sells antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.",
|
||
"meta": {
|
||
"country": "RU",
|
||
"official-refs": [
|
||
"https://www.kaspersky.com",
|
||
"https://securelist.com"
|
||
],
|
||
"synonyms": [
|
||
"Kaspersky Lab",
|
||
"Лаборатория Касперского"
|
||
]
|
||
},
|
||
"uuid": "0d4886f9-97e1-4cb2-8822-580fd09540e5",
|
||
"value": "Kaspersky"
|
||
},
|
||
{
|
||
"description": "Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference.",
|
||
"meta": {
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.paloaltonetworks.com",
|
||
"https://unit42.paloaltonetworks.com"
|
||
],
|
||
"synonyms": [
|
||
"Palo Alto Networks",
|
||
"Palo Alto Unit 42"
|
||
]
|
||
},
|
||
"uuid": "e9491d3b-2174-47d6-8a15-ecec552d16ae",
|
||
"value": "Palo Alto"
|
||
},
|
||
{
|
||
"description": "Trend Micro Inc. (トレンドマイクロ株式会社, Torendo Maikuro Kabushiki-Gaisha) is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points.",
|
||
"meta": {
|
||
"country": "JP",
|
||
"official-refs": [
|
||
"https://www.trendmicro.com"
|
||
],
|
||
"synonyms": [
|
||
"トレンドマイクロ株式会社"
|
||
]
|
||
},
|
||
"uuid": "3ac8f6fc-9c04-4ebd-bda2-788cc02fe4ed",
|
||
"value": "Trend Micro"
|
||
},
|
||
{
|
||
"description": "AhnLab, Inc. offers industry-leading cyber security solutions and services for consumers, enterprises, and small and medium-sized businesses worldwide. Founded in 1995, AhnLab provides comprehensive protection for endpoint, cloud, network, and other services. With its headquarters in South Korea, the most wired country in the world, AhnLab has become a leading innovator of dynamic security solutions that counter cyber threats.",
|
||
"meta": {
|
||
"country": "KR",
|
||
"official-refs": [
|
||
"https://www.ahnlab.com"
|
||
]
|
||
},
|
||
"uuid": "38847e35-166f-4025-a4bb-3e543058e353",
|
||
"value": "AhnLab"
|
||
},
|
||
{
|
||
"description": "Check Point Software Technologies Ltd. is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management.",
|
||
"meta": {
|
||
"country": "IL",
|
||
"official-refs": [
|
||
"https://www.checkpoint.com"
|
||
],
|
||
"synomyms": [
|
||
"Check Point Software Technologies Ltd.",
|
||
"Check Point Software"
|
||
]
|
||
},
|
||
"uuid": "adb3369a-5683-46b2-bceb-4dafa6526b21",
|
||
"value": "Check Point"
|
||
},
|
||
{
|
||
"description": "The Computer Emergency Response Team of Ukraine (CERT-UA) is a specialized structural unit of the State Center for Cyber Defense of the State Service for Special Communications and Information Protection of Ukraine.",
|
||
"meta": {
|
||
"country": "UA",
|
||
"official-refs": [
|
||
"https://cert.gov.ua"
|
||
]
|
||
},
|
||
"uuid": "b06fe596-eaa5-434a-88b8-5b21b1c8b60f",
|
||
"value": "CERT-UA"
|
||
},
|
||
{
|
||
"description": "Avast Software s.r.o. is a Czech multinational cybersecurity software company headquartered in Prague, Czech Republic, that researches and develops computer security software, machine learning, and artificial intelligence.",
|
||
"meta": {
|
||
"country": "CZ",
|
||
"official-refs": [
|
||
"https://www.avast.com"
|
||
]
|
||
},
|
||
"uuid": "0a93886e-a0e8-4972-991d-9935bf6c1565",
|
||
"value": "Avast"
|
||
},
|
||
{
|
||
"description": "The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government, coordinating cybersecurity programs with U.S. states, and improving the government's cybersecurity protections against private and nation-state hackers.",
|
||
"meta": {
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.cisa.gov",
|
||
"https://www.us-cert.gov"
|
||
],
|
||
"synonyms": [
|
||
"Cybersecurity and Infrastructure Security Agency"
|
||
]
|
||
},
|
||
"uuid": "7aa10919-06fd-46ec-88b8-e1cbf60f955c",
|
||
"value": "CISA"
|
||
},
|
||
{
|
||
"description": "JPCERT/CC is the first CSIRT (Computer Security Incident Response Team) established in Japan. The organization coordinates with network service providers, security vendors, government agencies, as well as the industry associations. As such, it acts as a 'CSIRT of CSIRTs' in the Japanese community. In the Asia Pacific region, JPCERT/CC helped form APCERT (Asia Pacific Computer Emergency Response Team) and provides a secretariat function for APCERT. Globally, as a member of the Forum of Incident Response and Security Teams (FIRST), JPCERT/CC cooperates with the trusted CSIRTs worldwide.",
|
||
"meta": {
|
||
"country": "JP",
|
||
"official-refs": [
|
||
"https://www.jpcert.or.jp"
|
||
],
|
||
"synonyms": [
|
||
"JPCERT/CC"
|
||
]
|
||
},
|
||
"uuid": "3caca164-4600-42a2-b2f0-7a552a66e7b6",
|
||
"value": "JPCERT"
|
||
},
|
||
{
|
||
"description": "Proofpoint, Inc. is an American enterprise cybersecurity company based in Sunnyvale, California that provides software as a service and products for email security, identity threat defense, data loss prevention, electronic discovery, and email archiving.",
|
||
"meta": {
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.proofpoint.com/"
|
||
]
|
||
},
|
||
"uuid": "cae79680-67a6-4411-903c-f824dbcc813f",
|
||
"value": "Proofpoint"
|
||
},
|
||
{
|
||
"description": "Qihoo 360 (Chinese: 奇虎 360; pinyin: Qíhǔ Sānliùlíng; approximate pronunciation CHEE-hoo), full name 360 Security Technology Inc., is a Chinese internet security company that has developed the antivirus software programs 360 Safeguard and 360 Mobile Safe, the Web browser 360 Secure Browser, and the mobile application store 360 Mobile Assistant.",
|
||
"meta": {
|
||
"country": "CN",
|
||
"official-refs": [
|
||
"https://www.360.cn/"
|
||
]
|
||
},
|
||
"uuid": "28bceaef-f6ab-418b-ac5b-7e4089a808b5",
|
||
"value": "Qihoo 360"
|
||
},
|
||
{
|
||
"description": "Bitdefender provides cybersecurity solutions with leading security efficacy, performance and ease of use to small and medium businesses, mid-market enterprises and consumers.",
|
||
"meta": {
|
||
"country": "RO",
|
||
"official-refs": [
|
||
"https://www.bitdefender.com/"
|
||
]
|
||
},
|
||
"uuid": "1c141c9b-ec78-4f86-a8ea-b02944fa5492",
|
||
"value": "Bitdefender"
|
||
},
|
||
{
|
||
"description": "Avira Operations GmbH & Co. KG is a German multinational computer security software company mainly known for its Avira Free Security antivirus software. Since 2021, Avira has been owned by American software company NortonLifeLock (now Gen Digital), which also operates Norton, Avast and AVG. It was previously owned by investment firm Investcorp.",
|
||
"meta": {
|
||
"country": "DE",
|
||
"official-refs": [
|
||
"https://www.avira.com"
|
||
]
|
||
},
|
||
"uuid": "e5964f36-7644-4f73-bdfd-f24d9e006656",
|
||
"value": "Avira"
|
||
},
|
||
{
|
||
"description": "Cloudflare, Inc. is an American company that provides content delivery network services, cloud cybersecurity, DDoS mitigation, wide area network services, reverse proxies, Domain Name Service, and ICANN-accredited domain registration services. Cloudflare's headquarters are in San Francisco, California.",
|
||
"uuid": "a0a87034-b8ff-4991-9ae1-e650a43292ef",
|
||
"value": "Cloudflare"
|
||
},
|
||
{
|
||
"description": "Recorded Future, Inc. is an American privately held cybersecurity company founded in 2009, with headquarters in Somerville, Massachusetts.",
|
||
"meta": {
|
||
"company-type": "Cyber Security Vendor",
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.recordedfuture.com/"
|
||
],
|
||
"product-type": [
|
||
"Digital Risk Protection",
|
||
"Threat Intelligence",
|
||
"Exposure Management",
|
||
"Threat Intelligence Feeds"
|
||
],
|
||
"products": [
|
||
"Threat Intelligence",
|
||
"Brand Intelligence",
|
||
"SecOps Intelligence",
|
||
"Vulnerability Intelligence",
|
||
"Third-Party Intelligence",
|
||
"Geopolitical Intelligence",
|
||
"Attack Surface Intelligence",
|
||
"Identity Intelligence",
|
||
"Payment Fraud Intelligence",
|
||
"Analyst On Demand"
|
||
],
|
||
"refs": [
|
||
"https://en.wikipedia.org/wiki/Recorded_Future",
|
||
"https://www.recordedfuture.com/resources"
|
||
],
|
||
"synonyms": [
|
||
"Recorded Future, Inc",
|
||
"Insikt Group"
|
||
]
|
||
},
|
||
"uuid": "ad7032df-0e9a-4ea9-b35c-c68ff854be80",
|
||
"value": "Recorded Future"
|
||
},
|
||
{
|
||
"description": "Cyble empowers organizations to take control of their cyber risks with AI-driven, cybersecurity platforms.",
|
||
"meta": {
|
||
"company-type": "Cyber Security Vendor",
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://cyble.com/"
|
||
],
|
||
"product-type": [
|
||
"Digital Risk Protection",
|
||
"Threat Intelligence",
|
||
"Exposure Management"
|
||
],
|
||
"products": [
|
||
"Cyble Vision",
|
||
"Cyble Hawk",
|
||
"AmIBreached",
|
||
"Odin",
|
||
"The Cyber Express"
|
||
],
|
||
"refs": [
|
||
"https://cyble.com/resources/",
|
||
"https://thecyberexpress.com/"
|
||
],
|
||
"synonyms": [
|
||
"The Cyber Express"
|
||
]
|
||
},
|
||
"uuid": "43e3e0a8-a12d-450a-8f2d-94915123549c",
|
||
"value": "Cyble"
|
||
},
|
||
{
|
||
"description": "CYFIRMA is a threat discovery and cyber-intelligence company with the world’s first platform that can deliver predictive cyber-intelligence",
|
||
"meta": {
|
||
"company-type": "Cyber Intelligence Provider",
|
||
"country": "SG",
|
||
"official-refs": [
|
||
"https://www.cyfirma.com/"
|
||
],
|
||
"product-type": [
|
||
"Threat Intelligence",
|
||
"Digital Risk Protection",
|
||
"Mobile App"
|
||
],
|
||
"products": [
|
||
"DeCYFIR",
|
||
"DeTCT",
|
||
"DeFNCE"
|
||
],
|
||
"refs": [
|
||
"https://www.cyfirma.com/research/",
|
||
"https://golden.com/wiki/CYFIRMA-K46ZYP8"
|
||
]
|
||
},
|
||
"uuid": "9d804c53-f307-421c-9f4d-41061c7eee62",
|
||
"value": "Cyfirma"
|
||
},
|
||
{
|
||
"description": "SentinelOne, Inc. is an American cybersecurity company listed on NYSE based in Mountain View, California.",
|
||
"meta": {
|
||
"company-type": "Cyber Security Vendor",
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.sentinelone.com/"
|
||
],
|
||
"product-type": [
|
||
"Endpoint Protection",
|
||
"Endpoint Detection Response",
|
||
"Deception Technology"
|
||
],
|
||
"products": [
|
||
"Singularity Platform",
|
||
"Singularity Identity",
|
||
"Singularity Hologram"
|
||
],
|
||
"refs": [
|
||
"https://www.sentinelone.com/labs/"
|
||
],
|
||
"synonyms": "Sentinel One"
|
||
},
|
||
"uuid": "996c48de-7bb8-414d-b6fe-ec94abb5f461",
|
||
"value": "SentinelOne"
|
||
},
|
||
{
|
||
"description": "Fortinet, Inc. is a cybersecurity company with headquarters in Sunnyvale, California. The company develops and sells security solutions like firewalls, endpoint security and intrusion detection systems.",
|
||
"meta": {
|
||
"company-type": "Cyber Security Vendor",
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.fortinet.com/"
|
||
],
|
||
"product-type": [
|
||
"Firewall",
|
||
"Application delivery controller",
|
||
"SOAR",
|
||
"Web application firewall / API security",
|
||
"Network security platform"
|
||
],
|
||
"products": [
|
||
"FortiADC",
|
||
"FortiAnalyzer",
|
||
"FortiAuthenticator",
|
||
"FortiCASB",
|
||
"FortiClient",
|
||
"FortiEDR",
|
||
"FortiCNP",
|
||
"FortiDDos",
|
||
"FortiDeceptor",
|
||
"FortiExtender",
|
||
"FortiGate",
|
||
"FortiIsolator",
|
||
"FortiMail",
|
||
"FortiManager",
|
||
"FortiNAC",
|
||
"FortiPAM",
|
||
"FortiSandbox",
|
||
"FortiSIEM",
|
||
"FortiSASE",
|
||
"FortiSOAR",
|
||
"FortiSwitch",
|
||
"FortiTester",
|
||
"FortiToken",
|
||
"FortiVoice",
|
||
"FortiWeb"
|
||
],
|
||
"refs": [
|
||
"https://en.wikipedia.org/wiki/Fortinet",
|
||
"https://www.fortinet.com/blog/threat-research"
|
||
]
|
||
},
|
||
"uuid": "bfafdca5-3171-4953-86ab-c74f44822fd3",
|
||
"value": "Fortinet"
|
||
},
|
||
{
|
||
"description": "Zscaler, Inc. (/ˈziːˌskeɪlər/) is an American cloud security company based in San Jose, California. The company offers cloud-based services to protect enterprise networks and data.",
|
||
"meta": {
|
||
"company-type": "Cyber Security Vendor",
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.zscaler.com/"
|
||
],
|
||
"product-type": [
|
||
"Secure Web Gateway",
|
||
"SASE",
|
||
"VPN",
|
||
"CASB",
|
||
"DLP"
|
||
],
|
||
"products": [
|
||
"Zscaler Internet Access",
|
||
"Zscaler Private Access",
|
||
"Zscaler Digital Experience",
|
||
"Zscaler Zero Trust Exchange"
|
||
],
|
||
"refs": [
|
||
"https://www.zscaler.com/blogs?type=security-research",
|
||
"https://en.wikipedia.org/wiki/Zscaler"
|
||
]
|
||
},
|
||
"uuid": "1427d7df-a9b8-4809-afe0-1180cfdd930d",
|
||
"value": "Zscaler"
|
||
},
|
||
{
|
||
"description": "Splunk Inc. is an American software company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated data via a web-style interface.",
|
||
"meta": {
|
||
"company-type": "Cyber Security Vendor",
|
||
"country": "US",
|
||
"product-type": [
|
||
"SIEM",
|
||
"Observability",
|
||
"SOAR",
|
||
"UEBA"
|
||
],
|
||
"products": [
|
||
"Splunk Enterprise Security",
|
||
"Splunk ITSI",
|
||
"Splunk SOAR",
|
||
"Splunk Observability Cloud",
|
||
"Splunk UEBA"
|
||
],
|
||
"refs": [
|
||
"https://www.splunk.com/",
|
||
"https://www.splunk.com/en_us/blog/security.html",
|
||
"https://en.wikipedia.org/wiki/Splunk"
|
||
]
|
||
},
|
||
"uuid": "7acb73f9-83c8-4a1d-88e5-873bad8659fa",
|
||
"value": "Splunk"
|
||
},
|
||
{
|
||
"description": "Huntress Labs Incorporated operates as a security software solution provider. The Company provides managed threat detection and response services to uncover, address persistent footholds that prevent defenses. Huntress Labs serves customers in the United States.",
|
||
"meta": {
|
||
"company-type": "Cyber Security Vendor",
|
||
"country": "US",
|
||
"official-refs": [
|
||
"https://www.huntress.com/"
|
||
],
|
||
"product-type": [
|
||
"Managed Security",
|
||
"Endpoint Detection Response",
|
||
"Security Awareness Training"
|
||
],
|
||
"products": [
|
||
"Managed EDR",
|
||
"MDR for Microsoft 365",
|
||
"Security Awareness Training",
|
||
"Managed SIEM"
|
||
],
|
||
"refs": [
|
||
"https://www.huntress.com/",
|
||
"https://www.huntress.com/blog"
|
||
]
|
||
},
|
||
"uuid": "9bfc59a7-ab20-4ef0-8034-871956d4a9cc",
|
||
"value": "Huntress"
|
||
}
|
||
],
|
||
"version": 14
|
||
}
|