Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

L 16-05 PJX-HM Shah Tower, 16A Jalan Persiaran Barat, 46050 Petaling Jaya, Selangor, Malaysia

Threat Intelligence reports and feeds

Threat Intelligence reports and feeds Get unique intel, stronger defenses

Threat intelligence from ESET’s world-renowned experts. Get a unique perspective on the threat landscape and improve your cybersecurity posture.

Get unique insights
Get unique insights

ESET gathers threat intelligence from a unique range of sources and has unparalleled in-the-field experience that helps you fight increasingly sophisticated cybersecurity attacks.

Stay ahead of adversaries
Stay ahead of adversaries

ESET follows the money, specifically monitoring those places where we have detected APT groups that target Western companies: Russia, China, North Korea, Iran. You’ll know about new threats first.

Make crucial decisions, faster
Make crucial decisions, faster

Anticipate threats and make faster, better decisions thanks to comprehensive ESET reports and curated feeds. Reduce your exposure to prevailing threats, forewarned by experts.

Improve your security posture
Improve your security posture

Informed by ESET intelligence feeds, enhance your threat hunting and remediation capabilities, block APTs and ransomware, and improve your cybersecurity architecture.

Automate threat investigation
Automate threat investigation

ESET technology searches for threats constantly, across multiple layers, from pre-boot to resting state. Benefit from telemetry on all countries where ESET detects emerging threats.

Access unparalleled expertise
Access unparalleled expertise

ESET has invested in building the world’s leading cybersecurity team, and 13 R&D centers worldwide. We use machine learning to help automate decisions, but our people stand behind threat evaluation.

users worldwide
0 bn+
business customers
0 k+
countries & territories
0
global R&D centers
0

Get APT reports you can act on – quickly and accurately

With APT Reports, you get:

Putting our best research at your fingertips

Our research team is well known in the digital security environment, thanks to our award winning We Live Security blog. Their great research and APT activity summaries are available, with much more detailed information at your disposal.

Actionable, curated content

Reports provide a great deal of context to what is going on and why. Thanks to this, organizations can prepare in advance for what might be coming. It’s not just the reports themselves – they are curated by our experts who put them in a human-readable format.

Make crucial decisions fast

All this helps organizations to make crucial decisions and provides a strategic advantage in the fight against digital crime. It brings an understanding of what is happening on the ‘bad side of the internet’ and provides crucial context, so that your organization can make internal preparations quickly.

Access to ESET Analyst

Every customer ordering the APT Reports PREMIUM package will have also access to an ESET analyst for up to four hours each month. This provides the opportunity to discuss topics in greater detail and help resolve any outstanding issues.

In-depth analysis

The package includes in-depth technical analysis reports describing recent campaigns, new toolsets and related subjects, and activity summary reports. A monthly overview combines information from all Technical Analysis and Activity Summary reports released in the previous month into a shorter and more digestible form.

Integrate ESET Threat Intelligence into your system

We have step-by-step integration manuals for fast and easy implementation and we’re continually adding others:

  • IBM QRadar integration manual
  • Anomali integration manual
  • MS Azure Sentinel integration manual
  • OpenCTI integration manual

ESET proprietary intelligence feeds

Enrich your view of the worldwide threat landscape based on unique telemetry. ESET feeds come from our research centers around the globe, providing a holistic picture and enabling you to quickly block IoCs in your environment. Feeds are in the formats • JSON • STIX 2.0

With ESET feeds, you get:

Malicious files feed

Understand which malicious files are being seen in the wild. Features domains which are considered malicious, including domain name, IP address, detection of file downloaded from URL and detection of the file which was trying to access the URL. This feed comprises shared hashes of malicious executable files and associated data.

Botnet feed

Based on ESET’s proprietary botnet tracker network, Botnet feed features three types of sub-feeds – botnet, C&C and targets. Data provided includes items such as detection, hash, last alive, files downloaded, IP addresses, protocols, targets and other information.

APT feed

This feed consists of APT information produced by ESET research. In general, the feed is an export from the ESET internal MISP server. All the data that is shared is also explained in greater detail in APT reports. The APT feed is also part of APT reports offering, but the feed can also be purchased separately.

Domain feed

Block domains which are considered malicious including domain name, IP address, and the date associated with them. The feed ranks domains based on their severity, which lets you adjust your response accordingly, for example to only block high-severity domains.

URL feed

Similar to Domain feed, the URL feed looks at specific addresses. It includes detailed information on data related to the URL, as well as information about the domains which host them. All the information is filtered to show only high confidence results and includes human-readable information on why the URL was flagged.

IP feed

This feed shares IPs considered to be malicious and the data associated with them. The structure of the data is very similar to that used for the domain and URL feeds. The main use-case here is to understand which malicious IPs are currently prevalent in the wild, block those IPs which are of high severity, spot those that are less severe, and investigate further, based on additional data, to see if they have already caused harm.

Explore our customized solutions

Please leave your contact details so we can design a personalized offer to fit your requirements.