Services for MSP & MSSP Providers
Data Feeds for the Collection of Indicators of Compromise:
Having as many indicators of compromise (IoC) as possible for proper analysis and prevention of client networks is essential for proactive cyber security. A serious recipient data feed, and those that are affordable, is always a serious strategic concern for an MSP or MSSP.
Discover how our direct data feeds, derived from our nine (9) different data collections, help you add to our IoC collection efforts and achieve better cyber security challenges and heightened protection for your client’s organization. Defending against cyber-attacks is more complex than ever. The hackers are highly sophisticated, well-funded, well-organized, and highly motivated, even at all competency levels. Their tactics, techniques, and procedures (TTPs) are constantly evolving and thus create the need for as many collection feeds as your MSP/MSSP can afford.
Our direct feeds offer your security organization added IoCs for proper protection. These collection efforts enable extra IoCs for your SOC professionals to protect your client’s networks better. Our deep understanding of the tactics, techniques, and procedures (TTPs) employed by all threat actors and the collection of these ill-gotten gains (IoCs) worldwide allows us to help you more effectively protect against cyber-attacks.
Data feeds are refreshed every 24 hours.
Prices are by dataset subscription.
For a demo, pricing, and options, please get in touch with Jim McKee at jmckee@redskyaliance.com
We collect daily on the below threat indices:
Monitor Botnets: We track publicly accessible open web proxies to identify potential bad actors.
Data Breach Research: We collect breach data from both known and less visible sources.
Dark Web (REDPANE): We collect data from the Tor network and other web-based forums.
Open-Source Data (OSINT): We collect data from paste websites, forums, and other sites where malicious activity may take place.
Compromised Keyloggers: We collect data from known keylogger aggregation points.
Malicious Email Attachments: We collect indicators extracted from the headers of emails where malicious attachments are detected.
Paste Storage Sites (OSINT): We collect domains, emails, and IP addresses extracted from pastebin.com.
Proprietary Sinkhole Collection: We run a proprietary sinkhole and collect indicators from known former malicious domains.
Source Code Secrets: We collect authentication keys, usernames and passwords, and API keys from open sources where users may have failed to configure their GitHub, GitLab, or bit-bucket repositories properly.
Download Full Data Discriptions