Threat Intelligence
Tired of playing catch-up? Our strategic & tactical threat intelligence turns complex data into sharp, actionable security advisories. Our military-trained analysts, fluent in cyber and geopolitics, arm decision-makers with the wider perspective and meaningful trends needed to craft real strategy.
Experience how our strategic threat intelligence has the edge
inspected daily
items/month
identified each day
No More Guessing: Threat Intelligence & IOC Feeds
We combine Check Point’s global network insights with Cyberint’s proprietary threat intelligence feeds and OSINT feeds. Get enriched IP addresses, domains, URLs, and file hashes, choosing consumption via daily IOC feeds or RESTful API for custom integrations. Each IOC is enriched with threat type, description, date of observation, confidence level, region, and more.
How it works
Uncover known and unknown assets and access points
Decoded Malware Threat Intelligence
Our Malware Intelligence cards provide an excellent starting point for evaluating specific malware risks. Access our comprehensive malware database with detailed cards that map TTPs to MITRE ATT&CK, link to CVEs, and include full, easily exportable IOC lists.
Threat Actor Profiling
Gain a deeper understanding of specific threat actors and groups. Our profiling includes their history, operations, recent victims, and targeted industries/regions. We detail their TTPs mapped to MITRE ATT&CK, the tools and CVEs they exploit, and associated operations, with exportable IOCs.
Deep Vulnerability Intelligence
Stop guessing CVE risk. Our vulnerability threat intelligence combines real-time deep/dark web data to enrich CVEs with vital context: risk levels, dark web chatter, and exploitation trends. For each CVE, get Cyberint’s exclusive Risk Score, plus actionable recommendations and full CVSS breakdown.
New IOC Chrome Extension
SOC Teams & Threat Hunters can access real-time data on any IOC through our browser extension. It puts real-time IOC and CVE data directly on any webpage and instantly enriches, revealing risk scores, C2s, and botnets for faster threat discovery.
Resources
FAQs
How does Cyberint scan the dark web?
some text
How does Cyberint scan the dark web?
some text
How does Cyberint scan the dark web?
some text
How does Cyberint scan the dark web?
sime text