“Decoding Political Violence with OSINT and Lessons from the Frontline”

Join deep dive: Wed, Dec 18, 16:00 CET
11 Sep 2023

Top 36 Threat Intelligence Providers for SOC Teams

Maltego Team

A Security Operations Center (SOC) team is tasked with continuously monitoring its environment to detect, analyze, and respond to remarkable cybersecurity events that might become incidents, ultimately improving the security posture of the organization.

However, for SOC teams to effectively monitor their environment, it is not enough to simply deploy security systems and tools that alert them to an indiscriminate number of events. They need to know what internal or external threat actors are doing, what their activity may look like, and how to find traces of said activity across their infrastructure.

Usually, the traces left behind by threat actors and picked up by the monitoring systems or hunting teams will be known as observables or indicators of compromise (IOCs)—IP addresses, host and domain names, email addresses, filenames, file hashes, and even log entries such as unusual login attempts —which, on their own and out of context, won’t be enough to conduct an in-depth investigation.

For a proper analysis that can lead to an effective assessment, including correlation to known or trending attacks as well as potential attribution, SOC analysts need to enrich and contextualize the traces found in their internal systems. This is where internal information and especially threat intelligence can help.


Threat Intelligence: Sources, Feeds, Platforms, and Providers 🔗︎

Threat intelligence is actionable and timely knowledge rooted in data. It provides analysts with the necessary context to understand threat actors’ motivations, methods, tools, and infrastructure, helping them prevent or mitigate attacks.

Practically speaking, threat intelligence relevant to an organization is generated by combining the traces found in the organization’s internal telemetry—such as firewall and event logs—with industry-specific threat data and information obtained through different intel sources, feeds, platforms, or providers.

Sources and Feeds 🔗︎

Two common threat intelligence sources are open-source intelligence (OSINT) and threat intelligence feeds. OSINT refers to intelligence derived from publicly available information, which is collected, analyzed, and shared to support specific investigations. Threat intelligence feeds are non-prioritized streams of data or digital artifacts and focus on specific areas or data types, such as suspicious domains, malicious URLs, known malware hashes, and IP addresses associated with malicious activity, among others.

While free threat intelligence feeds are usually gathered from open sources, paid threat intelligence feeds provide curated and contextualized data from closed sources, such as the dark web and cybercrime forums, or they may aggregate and process open-source feeds.

Platforms and Providers 🔗︎

A threat intelligence platform (TIP) is software used to organize several feeds—both free and paid—into a single stream. It makes them actionable across different protection, detection, and reaction tools.

Lastly, a threat intelligence provider is a vendor that collects and produces threat intelligence indicators and reports, sometimes using a mix of human and automated analysis. The provider then offers the intelligence via premium data feeds, as a report (an example would be the Mandiant’s APT1 report), or as part of a software product.

The human-generated part may include motivations, tactics, techniques, and procedures (TTPs) and attribution to a known actor, linking to past or ongoing campaigns, signatures for detection and hunting (such as Sigma or YARA rules), as well as response and forensic strategies. The automated part provides lists of observables in machine-readable format.

Incorporating Threat Intelligence into the SOC Team 🔗︎

It’s easy to see how one may stumble around in search of the right product to incorporate into their SOC team just by looking at the variety of options out there. With that in mind, SOC teams should first gain an insider view and comprehensive understanding of the following:

  1. Their network infrastructure
  2. The type of risks unique to their industry
  3. Where their security posture stands based on their current resources and capabilities to manage defensive and reactive activities
  4. Their available budget
  5. Resources they can dedicate to the project

However, even with the previous elements established, it is often difficult for SOC teams to choose the threat intelligence solution best suited to them and to determine how to properly take advantage of the data it provides without further burdening the analysts.

Maltego’s Top 36 Threat Intelligence Providers for SOC Teams 🔗︎

According to the 2022 SANS Cyber Threat Intelligence (CTI) Survey published in February 2022, the types of threat intelligence that are most useful for CTI operations include:

  1. Detailed information about malware being used in attacks
  2. Information about vulnerabilities being targeted by attackers
  3. Broad information about attacker trends
  4. Specific threat behaviors and TTPs of the adversary
  5. Specific IOCs to plug into IT and security infrastructure to block or find attacks

Source: SANS 2022 Cyber Threat Intelligence Survey

Based on these criteria, we have created a list of high-quality threat intelligence options for SOC teams that have proven to be among our end-users’ favorites and are suitable for all budget sizes.

The providers are divided into four categories:

The list is sorted in alphabetical order and does not indicate any ranking or preference.

Download Your Free Copy 🔗︎

Download this whitepaper for detailed descriptions and evaluations of the top threat intelligence providers. This will help you make accurate and suitable purchasing decisions for the needs and responsibilities of your SOC teams.

Don’t forget to follow us on Twitter, LinkedIn, and Mastodon, or sign up to our email newsletter for more whitepapers, case studies, and SOC tips similar to this!

Download the resource

DE +49
Albania +355
Algeria +213
Andorra +376
Angola +244
Anguilla +1264
Antigua And Barbuda +1268
Argentina +54
Armenia +374
Aruba +297
Australia +61
Austria +43
Azerbaijan +994
Bahamas +1242
Bahrain +973
Bangladesh +880
Barbados +1246
Belarus +375
Belgium +32
Belize +501
Benin +229
Bermuda +1441
Bhutan +975
Bolivia +591
Bosnia and Herzegovina +387
Botswana +267
Brazil +55
Brunei Darussalam +673
Bulgaria +359
Burkina Faso +226
Burundi +257
Cambodia +855
Cameroon +237
Canada +1
Cape Verde +238
Cayman Islands +1345
Central African Republic +236
Chile +56
China +86
Cote d'Ivoire +225
Colombia +57
Comoros +269
Congo +242
Cook Islands +682
Costa Rica +506
Croatia +385
Cuba +53
Cyprus +90392
Czech Republic +42
Denmark +45
Djibouti +253
Dominica +1809
Dominican Republic +1809
Ecuador +593
Egypt +20
El Salvador +503
Equatorial Guinea +240
Eritrea +291
Estonia +372
Ethiopia +251
Falkland Islands (Malvinas) +500
Faroe Islands +298
Fiji +679
Finland +358
France +33
French Guiana +594
French Polynesia +689
Gabon +241
Gambia +220
Georgia +995
Germany +49
Ghana +233
Gibraltar +350
Greece +30
Greenland +299
Grenada +1473
Guadeloupe +590
Guam +671
Guatemala +502
Guinea +224
Guinea-Bissau +245
Guyana +592
Haiti +509
Honduras +504
Hong Kong +852
Hungary +36
Iceland +354
India +91
Indonesia +62
Iran, Islamic Republic of +98
Iraq +964
Ireland +353
Israel +972
Italy +39
Jamaica +1876
Japan +81
Jordan +962
Kazakhstan +7
Kenya +254
Kiribati +686
Korea, Democratic People's Republic of +850
Korea, Republic of +82
Kuwait +965
Kyrgyzstan +996
Lao People's Democratic Republic +856
Latvia +371
Lebanon +961
Lesotho +266
Liberia +231
Libyan Arab Jamahiriya +218
Liechtenstein +417
Lithuania +370
Luxembourg +352
Macao +853
Macedonia, the former Yugoslav Republic of +389
Madagascar +261
Malawi +265
Malaysia +60
Maldives +960
Mali +223
Malta +356
Marshall Islands +692
Martinique +596
Mauritania +222
Mauritius +230
Mayotte +269
Mexico +52
Micronesia, Federated States of +691
Moldova, Republic of +373
Monaco +377
Mongolia +976
Montserrat +1664
Morocco +212
Mozambique +258
Myanmar +95
Namibia +264
Nauru +674
Nepal +977
Netherlands +31
New Caledonia +687
New Zealand +64
Nicaragua +505
Niger +227
Nigeria +234
Niue +683
Norfolk Island +672
Northern Mariana Islands +670
Norway +47
Oman +968
Pakistan +92
Palau +680
Panama +507
Papua New Guinea +675
Paraguay +595
Peru +51
Philippines +63
Poland +48
Portugal +351
Puerto Rico +1787
Qatar +974
Reunion +262
Romania +40
Russian Federation +7
Rwanda +250
San Marino +378
Sao Tome and Principe +239
Saudi Arabia +966
Senegal +221
Serbia +381
Seychelles +248
Sierra Leone +232
Singapore +65
Slovakia +421
Slovenia +386
Solomon Islands +677
Somalia +252
South Africa +27
Spain +34
Sri Lanka +94
Saint Helena +290
Saint Kitts and Nevis +1869
Saint Lucia +1758
Sudan +249
Suriname +597
Swaziland +268
Sweden +46
Switzerland +41
Syrian Arab Republic +963
Taiwan +886
Tajikistan +7
Thailand +66
Togo +228
Tonga +676
Trinidad and Tobago +1868
Tunisia +216
Turkey +90
Turkmenistan +993
Turks and Caicos Islands +1649
Tuvalu +688
Uganda +256
United Kingdom +44
Ukraine +380
United Arab Emirates +971
Uruguay +598
United States +1
Uzbekistan +7
Vanuatu +678
Holy See (Vatican City State) +379
Venezuela +58
Viet Nam +84
Virgin Islands, British +84
Virgin Islands, U.S. +84
Wallis and Futuna +681
Yemen +967
Zambia +260
Zimbabwe +263

By clicking on "Access", you agree to the processing of the data you entered and you allow us to contact you for the purpose selected in the form. For further information, see our Data Privacy Policy.

By clicking on "Subscribe", you agree to the processing of the data you entered and you allow us to contact you for the purpose selected in the form. For further information, see our Data Privacy Policy.