We are now generating a daily blacklist of malicious IPs via our own threat intel solution. The feed will be generated every 6 hours and is now available at
https://rescure.me
The below snapshot is the end result of the penultimate stage of co-relation of millions of data points that are finally grouped into attack groups before they are published at
rescure.me
![Cyber Threat Intelligence co-relation rescure.fruxlabs.com Cyber Threat Intelligence co-relation rescure.fruxlabs.com](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpb06rR_qaVlxH5r5qYRm-TozHRNo9eIPwiaUvKYsSImJYP4C61sMUe7P6ZkUJ5oGDxQ5Ib0YRRi915F-tAL76K0Ka7i2CW9DBuet428UaRI4qG9rmSqgNk36twW5XbtqZSCMo2xsIAcPs/s640/rishabh.JPG) |
Co-Relation snapshot at REScure Feed |
You are encouraged to try it and consume it into your security solutions. Since this is in beta, we are limiting it to only IPs.
![REScure Cyber Threat Intelligence Feed REScure Cyber Threat Intelligence Feed](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_NEl6HlAFFdI6CPtoQzdzo6tvU4KZTNKSC_L0u3e-pipggce2O2-3V2iBaS775t40_2_SA4RQz-5V8FnMXO0HZo3xYFWUABvsXr5k7LAeYly49d07qXmkidn_CCiBcuOl_6tmF2A6B2FV/s320/REScure-Cyber-Threat-Intelligence-Feed.jpg) |
Yep, REScure may look like this to your SIEM |
We are alpha testing API access, detailed Indicators of Compromise access, STIX/TAXII/OpenIOC exports, realtime refresh rates and a lot more. This is an independent project we undertook to enhance our understanding of underlying architecture of distributed systems, the nature of threat intelligence and how to efficiently collect/store/consume/distribute it.
The project is being jointly developed with
Sreyash and
Eshan.
Your feedback is appreciated, please share it at support@fruxlabs.com.
0 comments:
Need to say something ? Spell it out :)