This service includes case artifacts from public reports including IOCs. These artifacts may include event logs, memory dumps, packet captures, Zeek logs, webshells, ransomware files, and other intrusion related files. This service will also grant you access to our threat intel platform.
Companies and Organizations
This service includes access to the threat intelligence platform’s API to pull IOCs/events. This service is great for in house training or detection engineering. Download our artifacts and walk step by step through the intrusion. Artifacts are to be treated as TLP:AMBER+STRICT. Includes email Q&A as time permits. Please contact us for pricing.