🎉 ThreatConnect® 7.12 is now available! We love customer feedback. Write a review of ThreatConnect and we'll give you up to $50 as a thank-you gift!

CAL Automated Threat Library (ATL) Supported Blogs

Prev Next

Table 1 provides all of the source blogs in the CAL Automated Threat Library Source, including the source URL and corresponding ThreatConnect Tag for each blog.

 

Blog NameSource URLThreatConnect Tag
360 Netlab Bloghttps://blog.netlab.360.comBlog: 360 Netlab Blog
Anti-malware.ruhttps://www.anti-malware.ruBlog: Anti-malware.ru
Australian Cyber Security Centrehttps://www.cyber.gov.auBlog: Australian Cyber Security Centre
bellingcathttps://www.bellingcat.comBlog: bellingcat
Bitdefenderhttps://www.bitdefender.com/en-usBlog: Bitdefender
BlackBerryhttps://blogs.blackberry.com/Blog: BlackBerry
Bleeping Computerhttps://www.bleepingcomputer.comBlog: Bleeping Computer
Bushido Token Threat Intelhttps://blog.bushidotoken.net/Blog: Bushido Token Threat Intel
Canadian Centre for Cyber Securityhttps://www.cyber.gc.caBlog: Canadian Centre for Cyber Security
Center for Internet Securityhttps://www.cisecurity.orgBlog: Center for Internet Security
Centre gouvernemental de veillehttps://www.cert.ssi.gouv.frBlog: Centre gouvernemental de veille
CERT.athttps://www.cert.at/Blog: CERT.at
CERT EUhttps://cert.europa.euBlog: CERT EU
CERT Polskahttps://www.cert.plBlog: CERT Polska
CERT (Slovenia)https://www.cert.siBlog: CERT (Slovenia)
CERT (Sweden)https://www.cert.seBlog: CERT (Sweden)
CERT-UAhttps://cert.gov.ua/Blog: CERT-UA
CERT Vulnerability Notes Databasehttps://kb.cert.orgBlog: CERT Vulnerability Notes Database
Check Point Researchhttps://research.checkpoint.comBlog: Check Point Research
CISAhttps://cisa.gov/Blog: CISA
Cisco Umbrellahttps://umbrella.cisco.comBlog: Cisco Umbrella
Cofensehttps://cofense.comBlog: Cofense
Critical Threatshttps://www.criticalthreats.orgBlog: Critical Threats
CrowdStrikehttps://www.crowdstrike.comBlog: CrowdStrike
CSIRT-CVhttps://www.csirtcv.gva.esBlog: CSIRT-CV
CSO Onlinehttps://www.csoonline.comBlog: CSO Online
Curated Intelligencehttps://curatedintel.org/Blog: Curated Intelligence
Cyber Presshttps://cyberpress.orgBlog: Cyber Press
Cyber Security Newshttps://cybersecuritynews.comBlog: Cyber Security News
Cybereasonhttps://cybereason.com/Blog: Cybereason
Cybersecurity Divehttps://www.cybersecuritydive.comBlog: Cybersecurity Dive
CyberWirehttps://thecyberwire.com/newsletters/daily-briefing/Blog: CyberWire
CySecurity Newshttps://www.cysecurity.newsBlog: CySecurity News
Daily Dark Webhttps://dailydarkweb.netBlog: Daily Dark Web
Dark Readinghttps://www.darkreading.com/Blog: Dark Reading
DataBreacheshttps://databreaches.net/Blog: DataBreaches
DKCERThttps://www.cert.dkBlog: DKCERT
Don’t Read This Bloghttps://blog.unit221b.com/dont-read-this-blogBlog: Don't Read This Blog
Exploit Databasehttps://www.exploit-db.comBlog: Exploit Database
Fidelis Securityhttps://fidelissecurity.com/Blog: Fidelis Security
Financial Stability Boardhttps://www.fsb.org/Blog: Financial Stability Board
Flashpointhttps://www.flashpoint-intel.comBlog: Flashpoint
FOX-IThttps://blog.fox-it.comBlog: FOX-IT
F5https://www.f5.comBlog: F5
G DATAhttps://www.gdatasoftware.comBlog: G DATA
GBHackers on Securityhttps://gbhackers.comBlog: GBHackers on Security
GitHub Security Labhttps://github.comBlog: GitHub Security Lab
Google Security Bloghttps://security.googleblog.comBlog: Google Security Blog
Government Technologyhttps://www.govtech.com/Blog: Government Technology
GovInfoSecurityhttps://www.govinfosecurity.com/Blog: GovInfoSecurity
GreyNoise Labshttps://www.greynoise.ioBlog: GreyNoise Labs
Hackmageddonhttps://www.hackmageddon.comBlog: Hackmageddon
HackReadhttps://www.hackread.comBlog: HackRead
Have I Been Pwnedhttps://haveibeenpwned.comBlog: Have I Been Pwned
Heimdal Security Bloghttps://heimdalsecurity.com/blog/Blog: Heimdal Security Blog
Help Net Securityhttps://www.helpnetsecurity.comBlog: Help Net Security
HIPAA Journalhttps://www.hipaajournal.comBlog: HIPAA Journal
HYAShttps://hyas.com/Blog: HYAS
IBM-Think Bloghttps://www.ibm.com/think/news/Blog: IBM-Think Blog
Internet Crime Complaint Center (IC3)https://www.ic3.govBlog: IC3
Industrial Cyberhttps://industrialcyber.coBlog: Industrial Cyber
Infosecurity Magazinehttps://www.infosecurity-magazine.comBlog: Infosecurity Magazine
JPCERT コーディネーションセンターhttps://blogs.jpcert.or.jp/enBlog: JPCERT コーディネーションセンター
Kasperskyhttps://www.kaspersky.comBlog: Kaspersky
Krebs on Securityhttps://krebsonsecurity.comBlog: Krebs on Security
LevelBluehttps://levelblue.comBlog: LevelBlue
Malware Traffic Analysishttps://malware-traffic-analysis.net/Blog: Malware Traffic Analysis
Malwarebyteshttps://www.malwarebytes.com/Blog: Malwarebytes
McAfee Bloghttps://www.mcafee.com/blogsBlog: McAfee Blog
Microsoft Enterprisehttps://www.microsoft.com/en-us/security/blog/Blog: Microsoft Enterprise
MyCERThttps://www.mycert.org.myBlog: MyCERT
NCSC UKhttps://www.ncsc.gov.ukBlog: NCSC UK
Nextgovhttps://www.nextgov.comBlog: Nextgov
Nextron Systemshttps://nextron-systems.com/
Blog: Nextron Systems
Objective-Seehttps://objective-see.orgBlog: Objective-See
Official Google Bloghttps://blog.google/threat-analysis-group/Blog: Official Google Blog
Online Threat Alertshttps://onlinethreatalerts.com/Blog:Online Threat Alerts
Outpost24https://outpost24.comBlog: Outpost24
Palo Alto Networkshttps://security.paloaltonetworks.comBlog: Palo Alto Networks
Panda Securityhttps://www.pandasecurity.comBlog: Panda Security
Project Zerohttps://projectzero.googleBlog: Project Zero
Proofpointhttps://www.proofpoint.comBlog: Proofpoint
Recorded Futurehttps://www.recordedfuture.com/blogBlog: Recorded Future
Red Canaryhttps://redcanary.com/Blog: Red Canary
RedPacket Securityhttps://www.redpacketsecurity.comBlog: RedPacket Security
Resecurityhttps://www.resecurity.comBlog: Resecurity
ReversingLabshttps://www.reversinglabs.com/Blog: ReversingLabs
SANS Internet Storm Centerhttps://isc.sans.eduBlog: SANS Internet Storm Center
Schneier on Securityhttps://www.schneier.comBlog: Schneier on Security
Seclists - Fulldisclosurehttps://seclists.orgBlog: Seclists - Fulldisclosure
Securelisthttps://securelist.comBlog: Securelist
Security Affairshttps://securityaffairs.comBlog: Security Affairs
Security Weekhttps://www.securityweek.comBlog: Security Week
Sekoiahttps://blog.sekoia.io/Blog: Sekoia
Sentinel Onehttps://www.sentinelone.comBlog: Sentinel One
Seqritehttps://www.seqrite.comBlog: Seqrite
Sophoshttps://www.sophos.comBlog: Sophos
Splunkhttps://www.splunk.com/en_us/blog/author/secmrkt-research.htmlBlog: Splunk
Sucuri Bloghttps://blog.sucuri.netBlog: Sucuri Blog
Talos Bloghttps://blog.talosintelligence.comBlog: Talos Blog
Tech Xplorehttps://techxplore.comBlog: Tech Xplore
TechTargethttps://www.techtarget.com/searchsecurityBlog: TechTarget
Tenablehttps://www.tenable.comBlog: Tenable
TG Softhttps://tgsoft.it/Blog: TG Soft
ThaiCERThttps://www.thaicert.or.thBlog: ThaiCERT
The Citizen Labhttps://citizenlab.caBlog: The Citizen Lab
The Cyber Expresshttps://thecyberexpress.comBlog: The Cyber Express
The DFIR Reporthttps://thedfirreport.com/Blog: The DFIR Report
The Digest (Crypto-Ransomware)https://id-ransomware.blogspot.comBlog: The Digest (Crypto-Ransomware)
The Hacker Newshttps://thehackernews.comBlog: The Hacker News
The Recordhttps://therecord.mediaBlog: The Record
Think With Googlehttps://cloud.google.com/blog/topics/threat-intelligence/Blog: Think With Google
Traficomin Kyberturvallisuuskeskushttps://www.kyberturvallisuuskeskus.fiBlog: Traficomin Kyberturvallisuuskeskus
Trend Micro Bloghttps://blog.trendmicro.comBlog: Trend Micro Blog
Unit 42https://unit42.paloaltonetworks.comBlog: Unit 42
VIPRE Labshttps://vipre.com/Blog: VIPRE Labs
Virus Bulletinhttps://www.virusbulletin.comBlog: Virus Bulletin
Volexityhttps://volexity.com/Blog: Volexity
We Live Securityhttps://www.welivesecurity.comBlog: ESET We Live Security
Wizhttps://wiz.ioBlog: Wiz
Zero Day Initiativehttps://www.zerodayinitiative.com/blogBlog: Zero Day Initiative

ThreatConnect® is a registered trademark, and CAL™ is a trademark, of ThreatConnect, Inc.

20141-01 v.07.A