Table 1 provides all of the source blogs in the CAL Automated Threat Library Source, including the source URL and corresponding ThreatConnect Tag for each blog.
| Blog Name | Source URL | ThreatConnect Tag |
|---|---|---|
| 360 Netlab Blog | https://blog.netlab.360.com | Blog: 360 Netlab Blog |
| Anti-malware.ru | https://www.anti-malware.ru | Blog: Anti-malware.ru |
| Australian Cyber Security Centre | https://www.cyber.gov.au | Blog: Australian Cyber Security Centre |
| bellingcat | https://www.bellingcat.com | Blog: bellingcat |
| Bitdefender | https://www.bitdefender.com/en-us | Blog: Bitdefender |
| BlackBerry | https://blogs.blackberry.com/ | Blog: BlackBerry |
| Bleeping Computer | https://www.bleepingcomputer.com | Blog: Bleeping Computer |
| Bushido Token Threat Intel | https://blog.bushidotoken.net/ | Blog: Bushido Token Threat Intel |
| Canadian Centre for Cyber Security | https://www.cyber.gc.ca | Blog: Canadian Centre for Cyber Security |
| Center for Internet Security | https://www.cisecurity.org | Blog: Center for Internet Security |
| Centre gouvernemental de veille | https://www.cert.ssi.gouv.fr | Blog: Centre gouvernemental de veille |
| CERT.at | https://www.cert.at/ | Blog: CERT.at |
| CERT EU | https://cert.europa.eu | Blog: CERT EU |
| CERT Polska | https://www.cert.pl | Blog: CERT Polska |
| CERT (Slovenia) | https://www.cert.si | Blog: CERT (Slovenia) |
| CERT (Sweden) | https://www.cert.se | Blog: CERT (Sweden) |
| CERT-UA | https://cert.gov.ua/ | Blog: CERT-UA |
| CERT Vulnerability Notes Database | https://kb.cert.org | Blog: CERT Vulnerability Notes Database |
| Check Point Research | https://research.checkpoint.com | Blog: Check Point Research |
| CISA | https://cisa.gov/ | Blog: CISA |
| Cisco Umbrella | https://umbrella.cisco.com | Blog: Cisco Umbrella |
| Cofense | https://cofense.com | Blog: Cofense |
| Critical Threats | https://www.criticalthreats.org | Blog: Critical Threats |
| CrowdStrike | https://www.crowdstrike.com | Blog: CrowdStrike |
| CSIRT-CV | https://www.csirtcv.gva.es | Blog: CSIRT-CV |
| CSO Online | https://www.csoonline.com | Blog: CSO Online |
| Curated Intelligence | https://curatedintel.org/ | Blog: Curated Intelligence |
| Cyber Press | https://cyberpress.org | Blog: Cyber Press |
| Cyber Security News | https://cybersecuritynews.com | Blog: Cyber Security News |
| Cybereason | https://cybereason.com/ | Blog: Cybereason |
| Cybersecurity Dive | https://www.cybersecuritydive.com | Blog: Cybersecurity Dive |
| CyberWire | https://thecyberwire.com/newsletters/daily-briefing/ | Blog: CyberWire |
| CySecurity News | https://www.cysecurity.news | Blog: CySecurity News |
| Daily Dark Web | https://dailydarkweb.net | Blog: Daily Dark Web |
| Dark Reading | https://www.darkreading.com/ | Blog: Dark Reading |
| DataBreaches | https://databreaches.net/ | Blog: DataBreaches |
| DKCERT | https://www.cert.dk | Blog: DKCERT |
| Don’t Read This Blog | https://blog.unit221b.com/dont-read-this-blog | Blog: Don't Read This Blog |
| Exploit Database | https://www.exploit-db.com | Blog: Exploit Database |
| Fidelis Security | https://fidelissecurity.com/ | Blog: Fidelis Security |
| Financial Stability Board | https://www.fsb.org/ | Blog: Financial Stability Board |
| Flashpoint | https://www.flashpoint-intel.com | Blog: Flashpoint |
| FOX-IT | https://blog.fox-it.com | Blog: FOX-IT |
| F5 | https://www.f5.com | Blog: F5 |
| G DATA | https://www.gdatasoftware.com | Blog: G DATA |
| GBHackers on Security | https://gbhackers.com | Blog: GBHackers on Security |
| GitHub Security Lab | https://github.com | Blog: GitHub Security Lab |
| Google Security Blog | https://security.googleblog.com | Blog: Google Security Blog |
| Government Technology | https://www.govtech.com/ | Blog: Government Technology |
| GovInfoSecurity | https://www.govinfosecurity.com/ | Blog: GovInfoSecurity |
| GreyNoise Labs | https://www.greynoise.io | Blog: GreyNoise Labs |
| Hackmageddon | https://www.hackmageddon.com | Blog: Hackmageddon |
| HackRead | https://www.hackread.com | Blog: HackRead |
| Have I Been Pwned | https://haveibeenpwned.com | Blog: Have I Been Pwned |
| Heimdal Security Blog | https://heimdalsecurity.com/blog/ | Blog: Heimdal Security Blog |
| Help Net Security | https://www.helpnetsecurity.com | Blog: Help Net Security |
| HIPAA Journal | https://www.hipaajournal.com | Blog: HIPAA Journal |
| HYAS | https://hyas.com/ | Blog: HYAS |
| IBM-Think Blog | https://www.ibm.com/think/news/ | Blog: IBM-Think Blog |
| Internet Crime Complaint Center (IC3) | https://www.ic3.gov | Blog: IC3 |
| Industrial Cyber | https://industrialcyber.co | Blog: Industrial Cyber |
| Infosecurity Magazine | https://www.infosecurity-magazine.com | Blog: Infosecurity Magazine |
| JPCERT コーディネーションセンター | https://blogs.jpcert.or.jp/en | Blog: JPCERT コーディネーションセンター |
| Kaspersky | https://www.kaspersky.com | Blog: Kaspersky |
| Krebs on Security | https://krebsonsecurity.com | Blog: Krebs on Security |
| LevelBlue | https://levelblue.com | Blog: LevelBlue |
| Malware Traffic Analysis | https://malware-traffic-analysis.net/ | Blog: Malware Traffic Analysis |
| Malwarebytes | https://www.malwarebytes.com/ | Blog: Malwarebytes |
| McAfee Blog | https://www.mcafee.com/blogs | Blog: McAfee Blog |
| Microsoft Enterprise | https://www.microsoft.com/en-us/security/blog/ | Blog: Microsoft Enterprise |
| MyCERT | https://www.mycert.org.my | Blog: MyCERT |
| NCSC UK | https://www.ncsc.gov.uk | Blog: NCSC UK |
| Nextgov | https://www.nextgov.com | Blog: Nextgov |
| Nextron Systems | https://nextron-systems.com/ | Blog: Nextron Systems |
| Objective-See | https://objective-see.org | Blog: Objective-See |
| Official Google Blog | https://blog.google/threat-analysis-group/ | Blog: Official Google Blog |
| Online Threat Alerts | https://onlinethreatalerts.com/ | Blog:Online Threat Alerts |
| Outpost24 | https://outpost24.com | Blog: Outpost24 |
| Palo Alto Networks | https://security.paloaltonetworks.com | Blog: Palo Alto Networks |
| Panda Security | https://www.pandasecurity.com | Blog: Panda Security |
| Project Zero | https://projectzero.google | Blog: Project Zero |
| Proofpoint | https://www.proofpoint.com | Blog: Proofpoint |
| Recorded Future | https://www.recordedfuture.com/blog | Blog: Recorded Future |
| Red Canary | https://redcanary.com/ | Blog: Red Canary |
| RedPacket Security | https://www.redpacketsecurity.com | Blog: RedPacket Security |
| Resecurity | https://www.resecurity.com | Blog: Resecurity |
| ReversingLabs | https://www.reversinglabs.com/ | Blog: ReversingLabs |
| SANS Internet Storm Center | https://isc.sans.edu | Blog: SANS Internet Storm Center |
| Schneier on Security | https://www.schneier.com | Blog: Schneier on Security |
| Seclists - Fulldisclosure | https://seclists.org | Blog: Seclists - Fulldisclosure |
| Securelist | https://securelist.com | Blog: Securelist |
| Security Affairs | https://securityaffairs.com | Blog: Security Affairs |
| Security Week | https://www.securityweek.com | Blog: Security Week |
| Sekoia | https://blog.sekoia.io/ | Blog: Sekoia |
| Sentinel One | https://www.sentinelone.com | Blog: Sentinel One |
| Seqrite | https://www.seqrite.com | Blog: Seqrite |
| Sophos | https://www.sophos.com | Blog: Sophos |
| Splunk | https://www.splunk.com/en_us/blog/author/secmrkt-research.html | Blog: Splunk |
| Sucuri Blog | https://blog.sucuri.net | Blog: Sucuri Blog |
| Talos Blog | https://blog.talosintelligence.com | Blog: Talos Blog |
| Tech Xplore | https://techxplore.com | Blog: Tech Xplore |
| TechTarget | https://www.techtarget.com/searchsecurity | Blog: TechTarget |
| Tenable | https://www.tenable.com | Blog: Tenable |
| TG Soft | https://tgsoft.it/ | Blog: TG Soft |
| ThaiCERT | https://www.thaicert.or.th | Blog: ThaiCERT |
| The Citizen Lab | https://citizenlab.ca | Blog: The Citizen Lab |
| The Cyber Express | https://thecyberexpress.com | Blog: The Cyber Express |
| The DFIR Report | https://thedfirreport.com/ | Blog: The DFIR Report |
| The Digest (Crypto-Ransomware) | https://id-ransomware.blogspot.com | Blog: The Digest (Crypto-Ransomware) |
| The Hacker News | https://thehackernews.com | Blog: The Hacker News |
| The Record | https://therecord.media | Blog: The Record |
| Think With Google | https://cloud.google.com/blog/topics/threat-intelligence/ | Blog: Think With Google |
| Traficomin Kyberturvallisuuskeskus | https://www.kyberturvallisuuskeskus.fi | Blog: Traficomin Kyberturvallisuuskeskus |
| Trend Micro Blog | https://blog.trendmicro.com | Blog: Trend Micro Blog |
| Unit 42 | https://unit42.paloaltonetworks.com | Blog: Unit 42 |
| VIPRE Labs | https://vipre.com/ | Blog: VIPRE Labs |
| Virus Bulletin | https://www.virusbulletin.com | Blog: Virus Bulletin |
| Volexity | https://volexity.com/ | Blog: Volexity |
| We Live Security | https://www.welivesecurity.com | Blog: ESET We Live Security |
| Wiz | https://wiz.io | Blog: Wiz |
| Zero Day Initiative | https://www.zerodayinitiative.com/blog | Blog: Zero Day Initiative |
ThreatConnect® is a registered trademark, and CAL™ is a trademark, of ThreatConnect, Inc.
20141-01 v.07.A