Threat intelligence API Docs Pricing Resources Contact us


Posted on September 2, 2019

Domain Reputation API: Stop Defacers from Harming Your Brand

Your website is your business’s online front door. It’s the first place people would go to for information on your brand and products or services. Anyone and everyone who’s interested in working with you or purchasing your offerings is sure to come knocking on your door, and the best thing you can do is to keep it open if you want your company to flourish.

Keeping your website up and running should thus be one of your utmost priorities. To avoid having your brand raked in the mud, make sure it’s always updated, uncompromised, and as invulnerable to online attacks as possible. You don’t want to make cybercriminals or anyone with malicious intent feel welcome in your place of business.

One way to do that is by using Domain Reputation API, a tool that evaluates your domain’s reputation by means of a wide range of security data sources via a dynamic external configuration audit. Constantly check up on your domain’s safety to keep threats at bay. Find out why and how in this article.

Posted on August 5, 2019

Emotet Dominates the Threat Landscape in 2019

First discovered in 2014, Emotet is among some of the most destructive malware which has continued to threaten users through its worm-like abilities, polymorphic features, and five scrupulous spreader modules. Created as a banking Trojan which stole data by intercepting internet traffic, the malware started evolving in its new versions and is presently known to have the ability of downloading and dropping other malware in the form of banking Trojans or spam delivery services.

Posted on July 22, 2019

High-end Medical Imaging Equipment At Risk Of Cyber Attacks?

Healthcare industry has been one of hackers’ favorite targets for quite some time now.In order to prove the damage that could be caused by malicious entities to patients, far beyond just stealing their data, few data scientists in Israel took matters into their own hands to bring to light the looming threats of the serious security weaknesses in medical imaging equipment and networks.

Posted on July 8, 2019

How Threat Intelligence Platform and Automation Collaborate

With today's growing cyber threat landscape, security operation centers (SOCs) find themselves overwhelmed by the sheer volume of alerts each day. Without the use of automation, it would be impossible to filter through all of the false alarms to focus on the larger legitimate threats.

While automation is vital in the threat intelligence field, it's not enough on its own and that inadequacy only promises to grow over time. Teams of security specialists can't stay on top of the swivel-chair analysis and false alerts now, finding it impossible to wade through the endless flow of varying, incoming data.

Cyber thieves are using automation tools too in their creative, malevolent efforts, each day growing more familiar with the responses and actions of the security teams they continually test and target. Armed with automation tools themselves, human hackers must be faced head-on by human defenders using powerful automation-based defenses.

Posted on June 24, 2019

When Blockchain Meets Threat Intelligence

It seems that everyone is talking about Blockchain, Bitcoin, or some kind of crypto-currency-related topic. That makes sense. Blockchain is the hotness. It is the great promise that yields so many potential benefits. This is our turn to talk about blockchain and how, sooner rather than later, even threat intelligence will find its way, meet, and coordinate with blockchain in practice.

First, we should give a bit of context to threat intelligence. All too often, this term is thrown around a bit too casually, without regard to what the process truly provides or where it comes from. Threat intelligence is the process of gathering valuable, actionable insights about existing and emerging cyber threats. That’s a pretty concise description that hides a lot of what goes into threat intelligence as a valuable practice. Threat intelligence can be sourced from anywhere. From open source to proprietary databases to self-researched information, there are many ways to carry out threat intelligence in a practical and effective program.

Posted on June 10, 2019

5 Steps to Actionable Threat Intelligence

With everything that can be said about threat intelligence, it’s interesting to see how some organizations continue to struggle with threat intelligence programs. Recent survey participants seem to have some issues with this technology and with integrating volumes of threat information into cohesive, actionable insight. There’s a point to be made here in that threat intelligence have significant security value, but only if the operational program itself can ingest information and tie critical issues to actions.

Many organizations have some form of threat intelligence or another. Whether it’s a subscription to threat information or a full-blown integration to third-party threat intelligence services, there are many looks out there just as there are many levels of success to consider. Every organization, however, can benefit from the personal and institutional integration of foundational steps that focus on using this information and protecting the organization from specific threats.

Posted on June 3, 2019

Why Reputation Matters for Your Email Marketing

Email marketing has become one of the crucial ways for businesses to communicate and establish a relationship with their customers. Your marketing team can create a well-researched and enticing subject line followed by relevant content, visuals and a call to action, as well as ticking all the checkboxes for an ‘ideal email campaign’. But what if that email doesn't make it to your audience’s inbox?

Posted on May 27, 2019

Uncovering Botnets Through Domain Reputation

The purpose of this paper is to help educate technology practitioners, Internet users, technology executives and the security community on the importance of monitoring domain reputation to be protected against botnets and botnet-related activity. This knowledge gap discussion focuses on the validity and power of activity research and the context-based effect of publicly available WHOIS data.

Posted on May 13, 2019

Effective Digital Risk Management with Threat Intelligence

With as many as 4.1 billion internet users globally, 2.5 billion of whom are accessing the web on smartphones, businesses around the world have a lot to gain from having an online presence. While the internet provides businesses with a great medium for reaching out and connecting with an enormous global audience, it also opens them up to those with ill intentions.

The cybercrime landscape is constantly shifting and growing. Contrary to popular belief, small businesses are also increasingly targeted by hackers. Studies have shown that nearly 43% of the victims of cyber attack are small businesses. As many of 60% of those businesses will have to close their doors within 6 months as a result.

What can businesses do to protect themselves in such an environment?

Posted on April 29, 2019

What Role Does a Threat Intelligence Analyst Have in a Company

Threat intelligence is a rapidly growing field. Evidence-based information is made up of indicators or mechanisms of compromise, implications and advice, regarding emerging or existing threats to valuable assets. IT professionals use such intelligence to make decisions, form plans of action and act accordingly.

Posted on April 15, 2019

Sources of Threat Intelligence

There’s no big surprise here: cybercrime is growing at an alarming rate and experts are only predicting things to get worse in the years to come. The good news is that solutions too are being developed to prevent and reduce the prevalence of online threats. One of these is threat intelligence.

Threat intelligence, or TI, became a popular term as soon as it came out, but it can mean a slew of different things to many people. This is partly due to the wide range of formats, uses, and qualities for the types of data TI is involved in.

For companies who want to keep their cybersecurity up-to-date by looking at the sources of threat intelligence from different angles is a must do and it could result in big wins — i.e., uninterrupted operations, avoided financial damages, and untarnished reputation.

Let’s examine the fundamentals of threat intelligence so we can understand how to use it best.

Posted on April 1, 2019

An Insider Look at the Basics of Threat Intelligence

We have often heard it name-dropped during security planning meetings. The term “threat intelligence” has an intriguing flair to it and is starting to get lots of attention. In fact, threat intelligence investments keep going up year after year. Let’s dig into the subject and find out why.

Posted on March 18, 2019

5 Cybersecurity Trends and Threats to Watch Out for in 2019

When will the number of cyber attacks start to go down? At this point we can’t tell, because in 2019 it will definitely grow.

With devices and connections spreading among users, criminals will have new means to exploit personal and commercial information. They will also continue to improve their arsenal of tactics and tricks. And of course businesses will remain busy trying to stop them.

In this article, let’s take a closer look at the most important cybersecurity trends and threats that are bound to grab attention in 2019.

Posted on March 4, 2019

How Data Science Helps Threat Intelligence Analysis

Data science is a major player in today's industries. Its valuable insights in a world powered by information are helping global businesses innovate, expand, and vastly improve. Threat intelligence is one arena where the integration of data science has offered a myriad of powerful benefits.

Posted on February 18, 2019

2019: Beware a New Wave of Crypto Mining Abuse

Crypto Mining is the critical component that built the very foundation of cryptocurrency and blockchain. Fortunes have been made and lost in the world of cryptocurrency and the satellite industries that surround this exciting space. It seems however that anywhere that trade and technologies exist, malfeasance soon finds its way to them. Cryptocurrency is no different. Malware has long been one of the security banes of organizations everywhere. At some point, malware combined with crypto mining and security organizations were faced with a new plague known as “cryptojacking” ever since.

Posted on February 12, 2019

Building Threat Intel Security

A new year is upon us, along with new opportunities to step up the security game. Predictions cover the gambit of possibilities for the year ahead and accordingly, most security practitioners have adopted the principle of expecting the unexpected. Ranking high in most predictions for the year, advanced threats present a unique challenge. Be it desktop, malware, phishing, spam, and a variety of other threat types, malicious incidents can only continue to rise in every category.

Posted on February 7, 2019

2019: New Vulnerabilities Increase Threat Levels

The security industry is always trying to anticipate all that the threat landscape may bring and the beginning of a new year is an opportune time to take inventory of what’s out there, what’s coming, and what we can do about it. Try as we may, it’s probably best to stick to the principle of “expect the unexpected”, which means that a spectrum of flexible security options and tools are realities of the model security practice.

Posted on February 4, 2019

Putting Threat Intelligence into Action

One of the most compelling components of modern security operation is threat intelligence. The practice of compiling relevant, actionable data and actionizing this information into the organization’s cyber-defense protections has protected enterprises across the spectrum. Making threat intelligence a reality however is an entirely different matter. A properly deployed program can be difficult to implement and once implemented, if not focused on valuable information, the program could become ineffective.

Posted on January 30, 2019

The Importance of Threat Intelligence

Today, the internet has become an essential tool for most businesses and the general public. After all, the internet holds possibilities for worldwide communication, commerce, socializing, education, and many other usages. Like anything useful, the internet is not without its dangers. Various threats are invented and implemented every day and they can severely compromise individuals and businesses on the internet. If you are one of the millions of people who prefer to use the internet with less risk of being infected by these threats, Threat Intelligence could be the solution for you.

Posted on January 24, 2019

Your 2019 Security Task List

As we kick off another year, security practitioners look for information to make their environments safer, and easier to protect. Incidentally, most environments need better ways to enhance security to add value and capability, both technologically and practically.

Posted on January 21, 2019

3 Reasons Cyber threats Against Healthcare Are Increasing

Did you know that healthcare organizations are among the cybercriminals’ favorite targets? When it comes to cyber threats, you need to take them seriously with the right threat intelligence, especially in today’s digital world. Medical data and personal data could be stolen by hackers and when it’s stolen, it could be devastating for both your organization and the patient. What you may want to know is why cyber threats are on the increase in the healthcare industry. Here are three of those reasons.

Posted on January 9, 2019

5 Cyber Security Threats Domain Malware Check API Can Monitor

Malware is the sickness of computers.

Its attack is hard to detect and its effects can be absolutely devastating and costly for any business. In fact, in 2017, companies were altogether paying US $3.82 million per attack in an effort to contain the harm.

Posted on December 24, 2018

Domain Reputation API: The Benefits Behind the Numbers

Cybersecurity threats come in many forms and from different directions. Businesses may want to examine them one by one, but that might be difficult as they often have limited resources and know-how in the face of the continually evolving nature of attacks.

Posted on December 10, 2018

Threat Intelligence Feeds: Relevant and Evolving

As cyber threats are becoming more complicated and difficult for companies to handle, it’s no surprise that people want stronger cybersecurity. In a time where everything is digitalized, there are more threats than before. Traditional security isn’t enough. Threat intelligent feeds, however, can be. As more businesses turn digital, cybercriminals have more targets.

Posted on November 26, 2018

Connected Domains API: Cutting the Ties

Cybercriminals continue to grow in sophistication and daring, and traditional cybersecurity methods are no longer enough to contain them. Most Internet users share this view, as confirmed by a 2017 study where only 31% of respondents said traditional solutions provide the protection their organizations need.

In such a landscape, it is prudent to be proactive and take advantage of emerging cybersecurity approaches, and TIP’s Connected Domains API is one of them.

Posted on November 12, 2018

6 Reasons Why You Should Care about Domain’s Infrastructure Analysis

Location, location, location. That's the advice you hear when you're contemplating on opening up a business. You should be near where your customers are, they say, or you will be ignored. Well, the same principle applies when setting up a domain on the Internet. You should be near your targets. And the way to find whether you are is through Threat Intelligence Domain’s Infrastructure Analysis API.

Posted on November 6, 2018

SSL Configuration Analysis API: 5 Cyber Threats It Can Protect You From

Conducting business over the Internet is all about trust. It's not like going on a blind date, but rather about making sure that you won't end up being harmed or disappointed. This entails conducting a background check, lots of verification, and, finally, securing valid certification by ensuring that the people you're dealing with are who they say they are and that your confidential data will be safe with them.

Posted on October 29, 2018

SSL Certificates Chain Analysis API: Exploring the Chain

Trust is the bond that connects the many interactions on the web but it is only given after a company or website has been proven worthy of it. In this context, proof comes from SSL certificates provided through a chain of issuing authorities — checked for authenticity link by link through SSL Certificates Chain Analysis API.

Posted on October 22, 2018

All along the Watchtower: How this Solution Can Help Manage Digital Risk

Every single day, over 2.5 quintillion bytes of data are created. The Internet of Things (IoT) world of connected, smart devices is growing rapidly, and there’s estimated to be 26 smart objects per human on earth by 2020, with most of these devices being used in factories, business and healthcare. The enterprise application market could reach $288 billion by 2024...

Posted on October 15, 2018

4 Essential Threat Intelligence Tools to Keep Your Servers Safe

Owning a business in the 21st century means maintaining an effective and useful web site for potential clients to find and engage with your business. Unfortunately, a web presence follows a risk of cyber-attacks so it’s essential that your business be properly protected. Whether you’re a large corporation with a sizable cyber security unit, or you’re a small business and your own cyber security team, getting the right threat intelligence tools is vital. Taking advantage of these tools can make a difference between another successful day of operations and a major compromising incident which costs you both time and money...

Posted on October 8, 2018

Domain Malware Check: 10 Sources of Threat Intelligence You Should Know About

Malware poses one of the most dangerous threats to companies on the web. It is harmful, with consequences ranging from reputational to operational and financial damages. And it's relentless as over 350,000 malware and unwanted applications are recorded on a daily basis. So not surprisingly, malware costs companies an average of $2.4M every year...

Posted on September 11, 2018

5 Benefits of Cyber Threat Intelligence Services for Your Business

Since cybercrimes are becoming increasingly more common, businesses need a way to protect their sensitive data such as credit card, social security and address information from hackers and frauds. Threat intelligence services are an excellent way to ensure your company can adequately ward off invaders with robust security measures. Check out these five benefits of intelligence services to discover how your company can benefit from them.

Posted on September 5, 2018

5 More Examples of Threat Intelligence Platform Use Cases

Many businesses are looking for robust security measures as they learn about malicious hackers targeting organizations. No matter what industry you work in, there is always a chance that cyber criminals might steal the confidential financial and personal information of your clients. If you’re unsure whether to implement a threat intelligence platform, check out these five advantages to decide if your organization can benefit from it.

Posted on August 28, 2018

Do You Know Your Domain’s Reputation Score?

In early 2017, a San Francisco-based online recruitment company blasted an email out to the 20,000 contacts it had accumulated on its list for years. It was the first delivery in several years. Most of the emails did not reach their intended readers. Later, system administrators determined that the Internet Service Provider (ISP) that supported the company’s domain name had blacklisted the domain name – without even the company knowing it!

Posted on August 24, 2018

How to Be Intelligent about Threat Intelligence

As the cybersecurity landscape continues to evolve, threat intelligence (TI) has become an essential component of smarter data protection. We talked about the reasons why in last month’s Cyber Defense Magazine and summarized the key points in this post.

Posted on August 17, 2018

6 Reasons to Put Cyber Threat Intelligence Services to Work for Your Company

Today’s technological advances combined with steadily increasing instances of data breaches have made the mitigation of current cyber threats and prevention of future ones more crucial than ever. It’s vital that organizations implement secure and robust threat intelligence services that complement and seamlessly operate with their existing security infrastructure. The right cyber threat intelligence system offers a myriad of benefits that your company can’t — and shouldn’t — be without.

Posted on August 10, 2018

An Examination of the 5 Most Effective Threat Intelligence Use Cases

It’s integral to have a threat intelligence platform that protects your brand, employees, and clients from cyber threats. This complex threat prevention, recognition, and mitigation requires customization to meet specific needs. Use case approach is the most effective way to produce solid results. Via identification, clarification, and organization of system requirements, use cases examine potential system and user interactions to reach a specific goal.

Posted on August 9, 2018

Why Did Twitter Ban 70+ Million Accounts?

According to a report from The Washington Post, the online news and social networking service Twitter has banned more than 70 million fake and questionable accounts since May this year. The trend continued in June and carried on to July, with no indication of slowing down or stopping.

So, what’s the deal? Why did Twitter suddenly decide to ban 70+ million users? Doesn’t this seem like they are shooting themselves in the foot?

Posted on August 2, 2018

Why Your Threat Intelligence Implementation Can’t Wait Another Day

In the day of massive, well-funded, data-stealing and fast-moving criminal hacking organizations, it’s baffling that most companies don’t take threat intelligence as seriously as they should. Using the false assumption that only large, cash-filled organizations can invest in a threat intelligence platform, many take the wait-and-see approach and leave themselves vulnerable to potential attacks. Obviously, security experts don’t recommend any strategy that involves leaving your network vulnerable, so rather than holding out, you should make a point to pursue threat intelligence services immediately.

Posted on July 23, 2018

Four Key Considerations When Choosing Your Threat Intelligence Platform

Are you considering adding a threat intelligence capacity to your cybersecurity arsenal? An efficient threat intelligence platform can enhance security and simplify your security analysts’ jobs. Choosing the most effective and efficient platform can be a daunting task, but keeping four key points in mind will help you make the best decision for your organization.

Posted on July 21, 2018

Exactis Data Breach Takes Cybersecurity Professionals Back to Basics

In June 2018, cybersecurity researcher Vinny Troia discovered one the largest data breaches in history. Data broker Exactis had exposed a database of nearly 340 million records of individuals on a server that was publicly accessible. That amounted to 2 terabytes of personal and business data, according to Wired Magazine. It’s unclear whether criminals actually stole the data, which was left exposed for the taking.

Nevertheless, the exposure of Exactis records makes it one of the largest in the past decade: Equifax lost control of 145.5 million people's data, while the Yahoo hack affected 3 billion accounts.

Posted on July 19, 2018

The 6 Types of Threat Actors You Need to Know

If you’ve ever seen a true-crime documentary, you know that the first thing the detectives do upon discovering a crime is postulate the identity of the perpetrator.

To understand the motive, not to mention how the crime was committed, investigators play a game of psychological “what-ifs” to determine what sort of personality they are dealing with. The more they understand the criminal, the more likely they are not only to catch the villain, but also to prevent the crime from repeating.

The exploration of what sort of person commits cyber-crimes is still in its infancy. So much is made of the types of security we use to bottle up our assets, data, and infrastructures, that we don’t often think about who is behind the seemingly relentless stream of attacks that assault businesses, governments, and other web presences.

Posted on July 12, 2018

Why Are Crypto-Related Crimes on the Rise?

I remember it when this January, my brother told me that he’d bought some Bitcoins. I knew about the cryptocurrency, of course, but didn’t think much of it. However, given that someone I actually knew is now trading Bitcoins, I decided to dig a little deeper and pay more attention.

This was shortly after the Bitcoin craze that happened in 2017, when everybody and their mother bought Bitcoins and in December it got to over $17,500 per Bitcoin. Not much later, however, the “casuals” lost interest in it (probably finding some new shiny thing to keep them occupied for a while) and Bitcoin price started dropping again, going bellow $8,000 on 5th February.

Posted on July 9, 2018

Hackers Refine Phishing Techniques

In early January 2017, the payroll manager of Sunrun fulfilled what was meant to be a routine request for the W-2 tax forms of its 4,000 employees around the United States. The company offers leases for solar power equipment and services for homeowners.

The urgent request had come from the Sunrun’s CEO Lynn Jurich – or so it seemed. The information the payroll department emailed out included staff social security numbers, wage and tax figures, and addresses. The company discovered the well-planned email scam within an hour of the request, according to The San Francisco Chronicle.

A blend of technology, training, and policy solutions could have averted this scenario, as well as many others that occur every day.

Posted on July 6, 2018

6 Steps to Improve Your Threat Intelligence Platform

Cyber threats can come in many forms and shapes. From phishing attacks, social engineering and worms, to APTs - just to name a few - your company should be on constant lookout for those cyber threats and ways to prevent them. Otherwise, the impact on your finances and reputation with customers and shareholders may prove to be too much.

This is why your company needs to have a solid threat intelligence platform in place. With it, you can have at least some peace of mind when it comes to cyber threats that lurk around the online and offline world (remember, not all such attacks come from the Internet).

Posted on June 25, 2018

Just How Secure Is Your Organization in Today's Digital World?

Have you sat down with your IT department lately to review the strength of your organization’s cybersecurity plans? Have you recently experienced a data breach that has you questioning whether your company’s servers are actually secure? Ensuring that your organization’s threat intelligence is optimally prepared to prevent and combat cyberattacks is increasingly important in today’s digital world. In addition to listing the number of technical security tools you have in place, it is further necessary to consider the holistic environment of digital defense that your office maintains.

Posted on June 15, 2018

What to Look for in a Threat Intelligence Platform

Data protection and breach prevention have never been higher on the agenda. More and more IP assets and private details about customers, users, and employees are stored and transmitted online across multiple internal and external systems.

While that can be beneficial in many ways, this digital-driven environment has made it increasingly easy and lucrative for malicious outsiders to execute all kinds of sneaky attacks: advanced persistent threats, malware, phishing, and countless others. As a result, almost five million records are lost or stolen every day, and the cost of cybercrime worldwide is projected to rise to $6 trillion annually by 2021.

Posted on June 14, 2018

Automated Threat Intel Processing

This year 2018 in cyber security is about governance, automation and intelligence. More and more, critical infrastructure services are available only in the space of “cyber”. At the same time, malware incidents are causing immense losses for businesses, undermining sovereignty of many authorities and causing threats to human lives as well. Modern cyber authorities, sovereigns in the cyberspace, need access to better threat intelligence, to support their securitizing functions. But, manual processing even part of threat intelligence feeds takes time — and the network, as well as whole “cyber” space, is evolving all the time.

Posted on June 13, 2018

How Does Threat Intelligence Benefit Your Organization?

As a technology professional, you understand the need to keep your company protected from cyber-attacks. In fact, many would argue that there is no greater priority for IT departments than to keep their organization secure. However, most security measures that are implemented are based on blanket strategies that only hope to catch intruders before they cause any damage. With the threat of a security breach being ever-present, threat intelligence is necessary in order to gain information on potential threats and confidently protect against any strikes.

Have questions?

We work hard to improve our services for you. As part of that, we welcome your feedback, questions and suggestions. Please let us know your thoughts and feelings, and any way in which you think we can improve our product.

For a quick response, please select the request type that best suits your needs.

Or shoot us an email to