Live Threat Intelligence Resources
This page aggregates the highest-signal free threat intelligence resources for SOC analysts. Bookmark this as your daily threat briefing starting point.
Daily Briefing Sources
Government & CERT
| Source | URL | Update Frequency | Best For |
| CISA Known Exploited Vulnerabilities (KEV) | https://www.cisa.gov/known-exploited-vulnerabilities-catalog | Daily | Patch prioritization |
| CISA Alerts & Advisories | https://www.cisa.gov/news-events/cybersecurity-advisories | As needed | Critical threats |
| US-CERT Current Activity | https://www.cisa.gov/uscert/ncas/current-activity | Daily | Active campaigns |
| FBI Flash Advisories | https://www.ic3.gov/Home/IndustryAlerts | As needed | Criminal threat groups |
| NSA Cybersecurity Advisories | https://www.nsa.gov/Press-Room/Cybersecurity-Advisories-Technical-Guidance/ | Monthly | Nation-state TTPs |
| NCSC (UK) Threat Reports | https://www.ncsc.gov.uk/section/keep-up-to-date/threat-reports | Weekly | APT campaigns |
| ENISA Threat Landscape | https://www.enisa.europa.eu/topics/cyber-threats | Annual + updates | EU threat landscape |
| ASD/ACSC (Australia) | https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/cyber-supply-chain-risk-management | As needed | APAC threats |
Vendor Research Blogs
| Vendor | Focus | Notable Features |
| Mandiant/Google TI Blog | APT groups, incident research | Named threat actor tracking |
| CrowdStrike Intelligence | eCrime, nation-state | Adversary naming (Bears/Kittens/etc.) |
| Microsoft MSTIC | Azure/M365 attacks, nation-state | CVE/TTP correlation |
| Recorded Future | Geopolitical risk, dark web | Structured TI with confidence scores |
| Palo Alto Unit 42 | Malware families, campaigns | Excellent malware analysis |
| Secureworks CTU | eCrime, ransomware | Gold/Silver naming |
| Cisco Talos | Network threats, malware | Snort rules |
| ESET Research | APT, Eastern European threats | In-depth malware reports |
| Check Point Research | Mobile, cloud threats | Threat indices |
| Sophos X-Ops | Ransomware focus | State of Ransomware annual report |
OSINT & IOC Feeds
Free IOC Sources
| Feed | Type | STIX/TAXII? | Notes |
| AlienVault OTX | IP, domain, hash, URL | Yes (TAXII) | Community contributed, quality varies |
| Abuse.ch (MalwareBazaar) | Malware hashes | API | Curated malware samples |
| Abuse.ch (URLhaus) | Malicious URLs | API | Malware distribution URLs |
| Abuse.ch (ThreatFox) | IOCs (all types) | API | Community + automated |
| PhishTank | Phishing URLs | API | Crowdsourced phishing |
| OpenPhish | Phishing URLs | Feed | Automated detection |
| Emerging Threats (ET) Rules | Snort/Suricata rules | Download | Network detection |
| MISP Default Feeds | Multiple IOC types | MISP/STIX | Community MISP instances |
| DigitalSide TI | Multiple | MISP | Italian CERT feed |
| Botvrij.eu | Multiple | MISP | European TI |
Premium (Free Tier Available)
| Service | Free Tier | Use Case |
| VirusTotal | 4 lookups/min | Hash/URL/domain lookup |
| Shodan | Limited queries | Internet-facing asset exposure |
| Censys | Limited queries | Internet scan data |
| SecurityTrails | 50 queries/month | DNS history, domain intel |
| GreyNoise | Community tier | IP noise vs. signal |
| Spyse/SecurityTrails | Limited | OSINT enrichment |
Vulnerability Intelligence
Vulnerability Feeds
| Source | What It Provides | API? |
| NVD (NIST) | CVE details, CVSS scores | Yes |
| CISA KEV | Actively exploited vulns | Yes (JSON) |
| EPSS (FIRST.org) | Exploit probability scoring | Yes |
| VulnDB (Risk Based Security) | Commercial, comprehensive | Paid |
| Exploit-DB | Public exploits, PoC | Search |
| 0day.today | Exploit marketplace | Research only |
| Packet Storm | Exploits, advisories | Search |
Vulnerability Query
# Fetch CISA KEV programmatically
import requests
kev = requests.get("https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json").json()
for vuln in kev['vulnerabilities']:
print(f"{vuln['cveID']} | {vuln['vendorProject']} | Due: {vuln['dueDate']}")
Dark Web Monitoring (Free/OSINT Methods)
Legal and Operational Security
Dark web research must be conducted through proper channels with appropriate operational security. Use Tor Browser or dedicated research VMs. Never use corporate credentials or personal identity for dark web research.
Ransomware Leak Site Monitoring (via OSINT)
Several security researchers maintain indexed/archived versions of ransomware group activity:
| Resource | What It Tracks |
| Ransomwatch (GitHub) | Ransomware group sites, victim counts |
| DarkFeed | Aggregated ransomware posts (paid) |
| ID Ransomware | Ransomware identification service |
| NoMoreRansom.org | Decryptors, victim support |
| CISA Ransomware Guide | Defensive guidance |
Threat Actor Tracking
ATT&CK Groups Database
MITRE ATT&CK Groups page provides structured TTP data for 130+ threat actors: - Technique mappings per group - Software used - Campaign timeline - References
ATT&CK Group Matrix: https://attack.mitre.org/groups/
ATT&CK Navigator: https://mitre-attack.github.io/attack-navigator/
Key APT Group Quick Reference
| Group | Also Known As | Origin | Primary Targets | Key TTPs |
| APT28 | Fancy Bear, STRONTIUM | Russia (GRU) | Government, defense, elections | T1566, T1078, T1071 |
| APT29 | Cozy Bear, Midnight Blizzard | Russia (SVR) | Government, think tanks, cloud | T1078.004, T1560, T1102 |
| APT41 | Double Dragon, BARIUM | China (MSS) | Telecom, finance, gaming | T1078, T1027, T1105 |
| Lazarus Group | Hidden Cobra | North Korea (RGB) | Finance, crypto, defense | T1059, T1003, T1486 |
| Volt Typhoon | Bronze Silhouette | China | Critical infrastructure | T1078, LOLBAS heavy |
| Scattered Spider | 0ktapus | eCrime (EN-speaking) | Finance, cloud (Okta, M365) | T1078.004, T1566.001 |
| FIN7 | Carbanak, Carbon Spider | eCrime | Hospitality, finance, retail | T1566, T1059.001 |
| LockBit | Gold Mystic | eCrime (RaaS) | All sectors | T1486, T1490, T1048 |
| Cl0p | TA505 | eCrime | Financial, healthcare | T1190, T1048, T1486 |
| ALPHV/BlackCat | Noberus | eCrime (RaaS defunct) | Healthcare, manufacturing | T1486, T1048, BYOVD |
Malware Family Intelligence
| Platform | Use Case | Free? |
| MalwareBazaar | Download/share samples | Yes |
| Any.run | Interactive sandbox | Yes (limited) |
| Hybrid Analysis | Automated sandbox | Yes |
| Triage (tria.ge) | Automated sandbox | Yes |
| VirusTotal | Multi-engine scan + behavior | Free (limited) |
| Cuckoo Sandbox | Self-hosted sandbox | Yes (self-hosted) |
| Cape Sandbox | Self-hosted, memory dumps | Yes (self-hosted) |
| YARA Rules (YARAhub) | Detection rules for families | Yes |
| ISAC | Sector |
| FS-ISAC | Financial Services |
| H-ISAC | Healthcare |
| E-ISAC | Electricity / Energy |
| IT-ISAC | Technology |
| WS-ISAC | Water/Wastewater |
| A-ISAC | Aviation |
| MS-ISAC | State/Local Government |
- FIRST.org — Forum of Incident Response and Security Teams, global
- Slack: ThreatIntel.org — Analyst community (invite-based)
- LinkedIn Security Groups — Threat intelligence sharing
- Twitter/X: #threatintel, #infosec — Real-time community sharing
- Mastodon: infosec.exchange — Privacy-conscious security community
Regulatory & Compliance Intelligence
| Body | Jurisdiction | Key Publications |
| CISA (US) | United States | Shields Up, KEV, Joint Advisories |
| FTC | United States | Breach enforcement, data security guidance |
| SEC | United States | Cybersecurity disclosure rules (material breach 4 days) |
| EDPB | European Union | GDPR enforcement, data breach notification guidelines |
| ICO | United Kingdom | UK GDPR, breach notification |
| OAIC | Australia | Privacy Act, NDB scheme |
| PDPB | India | Personal Data Protection Bill |
| PIPL | China | Data localization, cross-border transfer |
Building Your Threat Intelligence Program
For implementing a structured TI program, see:
- Chapter 7: Threat Intelligence & Context
- Detection Query Library — integrate IOCs as detection rules
- Threat Hunt Hypothesis Library — actor-specific hypotheses
- Lab 5: LLM Guardrails Eval — AI-assisted TI analysis
Last reviewed: March 2026 | Maintained by Nexus SecOps Contributors