A large number of threat intel RSS feeds for the security community. Includes service detects and updates, new vulnerabilities, updates, and bad actor IP address updates.
A crowdsourced public database where you can report and look up the abuse histories of IP addresses on the Net. Has a REST API with a 1000 request/day free tier. Can integrate with fail2ban.
Monitored by Glitch.
Talkback is a smart infosec resource aggregator, designed to help security enthusiasts, practitioners and researchers be more productive. The system works by continuously monitoring several resource mediums for infosec news and publications, parses all content, classifies and hydrates the data-set, then presents this via a simple UI. Fully automated infosec resource aggregation from feeds/mediums that dates back 15+ years. Filtering and keyword searching across all resources. A resource category classifier organises resources into several potential disciplines. A resource ranking formula that factors in several attributes. Highlighting resources that have been featured by reputable infosec curators. Tracking popularity across social media platforms. Cross referencing between resources. Integration with Shodan to show hosting information of resources and NVD to enrich CVE references.
No API yet.
Maybe add to Searx?
A somewhat silly website that talks about recently discovered 0-day vulnerabilities.
RSS feed: https://0dayfans.com/feed.rss
An open project to list all known cloud vulnerabilitiesand Cloud Service Provider security issues.
A news aggregator of new and ongoing data breach cases.
A blog that documents recent and ongoing system intrusions, with a focus on ransomware attacks.
OpenCVE lets you search the CVE you want filtered by vendor, product, CVSS or CWE. Synchronized with the feed provided by the NVD. So each CVE displays the standards you already know (CVE, CPE, CWE, CVSS). You can then subscribe as many vendors or products as you want, and you will be notified as soon as a CVE concerning them is published or updated. Your custom dashboards and reports only include the CVEs associated with your subscriptions, and you can filter the list by keywords of CVSS score. OpenCVE keeps track of the changes, so you can find the history of your alerts in your Reports page. Can be self-hosted if you're concerned about leaking information outside of your organization.
REST API: https://docs.opencve.io/api/
Community driven open database of vulnerability exploitation in the wild. We believe that exploitation information is about safety and it should be easy to access and not be behind paywalls. Get alerts on new reports of exploitation via RSS, Twitter, grab our docker image, the hourly database exports or get the full exploited list in the API.