MITRE ATT&CK, VirusTotal, AlienVault OTX. IOC feeds. Threat actor profiling.
Threat Intelligence (TI) is evidence-based knowledge about existing or emerging threats. It includes IOCs (Indicators of Compromise), TTPs (Tactics, Techniques, Procedures), threat actor profiles, and vulnerability data used to make informed defensive decisions.
High-level, executive audience
TTPs, how attackers operate
Specific attack indicators (IOCs)
Upload files/URLs for scanning by 70+ AV engines. Check file hashes, domain reputation. Free API (limited queries).
Community-driven threat feed. 100,000+ participants share IOCs. Free API. Pulses (curated threat reports).
Framework mapping adversary tactics/techniques. 14 tactics (Initial Access, Execution, Persistence...). Used for threat modeling.
Commercial TIP (Threat Intelligence Platform). Aggregate feeds, enrich IOCs, integrate with SIEM/SOAR. Expensive.
Free feeds of malicious URLs, malware samples. Real-time updates. Community-maintained.
Government threat advisories (ICS alerts, BOD directives). STIX/TAXII feeds. Free for US entities.
MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations. 14 tactics with 200+ techniques.
💡 Use ATT&CK to map detected threats to known techniques and prioritize defenses
Match network logs against threat feed IPs/domains
Automated blocking of known-bad IPs from threat feeds
When SIEM sees suspicious IP, lookup in VirusTotal/OTX to add context (malware family, threat actor)
Threat intel feeds shared WannaCry file hashes and kill-switch domain hours after outbreak.
Enable threat feeds and search for IOCs (IPs, domains, hashes, MITRE techniques).