# OPTIX > OPTIX (Operational Platform for Threat Intelligence eXploration) is a community-driven threat intelligence platform that aggregates open-source threat intelligence (OSINT), extracts structured cyber threat intelligence (CTI) — threat actors, malware families, CVEs, IOCs, and MITRE ATT&CK techniques — correlates entities across reports, and generates SIEM detection rules in 11+ formats including Sigma, Splunk SPL, Microsoft KQL, Elastic EQL, CrowdStrike LogScale, and YARA. OPTIX is built for SOC analysts, CTI teams, incident responders, and detection engineers — particularly small teams and organisations that don't have a dedicated CTI capability but still need enterprise-grade coverage of the threat landscape. ## Core capabilities - Automated CTI collection from RSS, OSINT, vendor advisories, threat blogs, AlienVault OTX, URLhaus, NVD, Reddit, and Discord. - Multi-stage extraction: deterministic pattern matching, fuzzy entity resolution, LLM semantic scoring. - Correlation engine linking threat actors, malware, CVEs, IOCs, TTPs, and MITRE ATT&CK techniques across the knowledge base. - Detection rule generation: Sigma, Splunk SPL, Microsoft KQL, Elastic EQL/ES|QL, CrowdStrike LogScale, QRadar AQL, Chronicle UDM, SentinelOne S1QL, Palo Alto XQL, Suricata, YARA. - Intelligence reports with full source attribution, exportable to PDF and Word. - STIX 2.1 / TAXII 2.1 producer and consumer for SOAR and TIP interoperability. - MITRE ATT&CK coverage heatmap. - Multi-tenant workspaces with role-based access control. ## Key concepts and entities Cyber Threat Intelligence (CTI), Threat Intelligence Platform (TIP), MITRE ATT&CK, Tactics Techniques and Procedures (TTPs), Indicators of Compromise (IOCs), APT groups, malware families, vulnerabilities (CVE), Sigma rules, KQL, SPL, EQL, YARA, Suricata, Threat Hunting, Detection Engineering, SIEM, SOAR, Incident Response (IR), Open Source Intelligence (OSINT), AlienVault OTX, URLhaus, NVD, Microsoft Sentinel, Splunk, Elastic Security, CrowdStrike Falcon, Chronicle, QRadar, SentinelOne, Palo Alto Cortex. ## Canonical pages - [OPTIX home](https://optixthreatintelligence.co.uk/) - [About OPTIX](https://optixthreatintelligence.co.uk/about) - [Plans and pricing](https://optixthreatintelligence.co.uk/plans) - [Alternatives and comparisons](https://optixthreatintelligence.co.uk/alternatives) - [Guides hub](https://optixthreatintelligence.co.uk/guides) ## Guides and articles - [From Blog Post to Detection Rule: A Full CTI Pipeline Walkthrough](https://optixthreatintelligence.co.uk/guides/blog-post-to-detection-rule): How a single threat intelligence blog post becomes structured entities, IOCs, MITRE ATT&CK mappings, and ready-to-deploy SIEM detection rules. - [How to Run Threat Intelligence Without a Dedicated CTI Team](https://optixthreatintelligence.co.uk/guides/threat-intelligence-without-cti-team): A practical playbook for SOC analysts and security engineers who own threat intelligence as a part-time responsibility. - [Turning APT Reports into KQL and Sigma in Minutes](https://optixthreatintelligence.co.uk/guides/apt-reports-to-kql-sigma): Convert long-form APT reports into Microsoft Sentinel KQL queries and Sigma rules without manually rewriting the logic. - [Why Most Threat Intelligence Fails in SOC Environments](https://optixthreatintelligence.co.uk/guides/why-threat-intelligence-fails-in-soc): The four reasons CTI feeds collect dust in SOCs — and how to make threat intelligence operationally useful for detection and response. - [Building a Detection Engineering Pipeline from OSINT](https://optixthreatintelligence.co.uk/guides/detection-engineering-pipeline-from-osint): Architect a repeatable pipeline that turns open-source threat intelligence into validated detections across Splunk, Sentinel, Elastic, and CrowdStrike. - [CTI vs Threat Hunting: Where Most Teams Get It Wrong](https://optixthreatintelligence.co.uk/guides/cti-vs-threat-hunting): The difference between cyber threat intelligence and threat hunting, why teams conflate them, and how they should reinforce each other. - [How to Automate MITRE ATT&CK Mapping from Threat Intelligence](https://optixthreatintelligence.co.uk/guides/automate-mitre-attack-mapping): Automate the mapping of CTI reports and IOCs to MITRE ATT&CK tactics and techniques to drive coverage analysis and detection prioritisation. - [Community vs Paid Threat Feeds: When Each One Wins](https://optixthreatintelligence.co.uk/guides/community-vs-paid-threat-feeds): Where free community feeds (OTX, URLhaus, MISP) outperform paid intel, where paid feeds still earn their cost, and how to combine them. - [How to Correlate Threat Intelligence Across Multiple Sources Automatically](https://optixthreatintelligence.co.uk/guides/correlate-threat-intelligence-across-sources): Cross-source correlation, alias resolution, and entity deduplication for analysts who get the same intel reported five different ways. ## Intelligence Library (/intel) OPTIX maintains a structured intelligence library at https://optixthreatintelligence.co.uk/intel covering 208 profiles across 8 categories: threat actor profiles, malware family overviews, CVE and vulnerability classes, MITRE ATT&CK technique guides, detection engineering topics, IOC type references, SIEM integration guides, and sector threat briefs. ### Threat Actor Profiles - [APT28 (Fancy Bear)](https://optixthreatintelligence.co.uk/intel/apt28-fancy-bear) - [APT29 (Cozy Bear)](https://optixthreatintelligence.co.uk/intel/apt29-cozy-bear) - [APT41 (Double Dragon)](https://optixthreatintelligence.co.uk/intel/apt41-double-dragon) - [Lazarus Group](https://optixthreatintelligence.co.uk/intel/lazarus-group) - [FIN7](https://optixthreatintelligence.co.uk/intel/fin7) - [LockBit](https://optixthreatintelligence.co.uk/intel/lockbit-ransomware-group) - [Conti](https://optixthreatintelligence.co.uk/intel/conti-ransomware-group) - [BlackCat (ALPHV)](https://optixthreatintelligence.co.uk/intel/blackcat-alphv) - [Volt Typhoon](https://optixthreatintelligence.co.uk/intel/volt-typhoon) - [Sandworm](https://optixthreatintelligence.co.uk/intel/sandworm) - [Scattered Spider](https://optixthreatintelligence.co.uk/intel/scattered-spider) - [REvil (Sodinokibi)](https://optixthreatintelligence.co.uk/intel/revil-sodinokibi) - [Lapsus$](https://optixthreatintelligence.co.uk/intel/lapsus-group) - [Cobalt Group](https://optixthreatintelligence.co.uk/intel/cobalt-group) - [DarkSide](https://optixthreatintelligence.co.uk/intel/darkside-ransomware) - [Kimsuky](https://optixthreatintelligence.co.uk/intel/kimsuky) - [TA505](https://optixthreatintelligence.co.uk/intel/ta505) - [Turla](https://optixthreatintelligence.co.uk/intel/turla) - [Patchwork](https://optixthreatintelligence.co.uk/intel/patchwork-apt) - [MuddyWater](https://optixthreatintelligence.co.uk/intel/muddywater) - [APT33 (Elfin)](https://optixthreatintelligence.co.uk/intel/apt33-elfin) - [APT34 (OilRig)](https://optixthreatintelligence.co.uk/intel/apt34-oilrig) - [APT10 (MenuPass)](https://optixthreatintelligence.co.uk/intel/apt10-menupass) - [Charming Kitten (APT35)](https://optixthreatintelligence.co.uk/intel/charming-kitten) - [Cl0p Ransomware Group](https://optixthreatintelligence.co.uk/intel/cl0p-ransomware-group) - [UNC2452 / NOBELIUM](https://optixthreatintelligence.co.uk/intel/unc2452-nobelium) - [Carbanak](https://optixthreatintelligence.co.uk/intel/carbanak-apt) - [Winnti Group](https://optixthreatintelligence.co.uk/intel/winnti-group) - [DarkHotel](https://optixthreatintelligence.co.uk/intel/darkhotel-apt) - [BITTER](https://optixthreatintelligence.co.uk/intel/bitter-apt) - [APT38](https://optixthreatintelligence.co.uk/intel/apt38-lazarus-financial) - [Scattered Spider](https://optixthreatintelligence.co.uk/intel/scattered-spider-tactics) ### Malware Family Overviews - [Emotet](https://optixthreatintelligence.co.uk/intel/emotet-malware) - [Qakbot](https://optixthreatintelligence.co.uk/intel/qakbot-malware) - [Cobalt Strike](https://optixthreatintelligence.co.uk/intel/cobalt-strike) - [Mimikatz](https://optixthreatintelligence.co.uk/intel/mimikatz) - [IcedID](https://optixthreatintelligence.co.uk/intel/icedid-malware) - [Ryuk](https://optixthreatintelligence.co.uk/intel/ryuk-ransomware) - [Black Basta](https://optixthreatintelligence.co.uk/intel/blackbasta-ransomware) - [Sliver](https://optixthreatintelligence.co.uk/intel/sliver-c2) - [SystemBC](https://optixthreatintelligence.co.uk/intel/systembc-malware) - [Raccoon Stealer](https://optixthreatintelligence.co.uk/intel/raccoon-stealer) - [Remcos RAT](https://optixthreatintelligence.co.uk/intel/remcos-rat) - [AsyncRAT](https://optixthreatintelligence.co.uk/intel/asyncrat-malware) - [Metasploit](https://optixthreatintelligence.co.uk/intel/metasploit-framework) - [njRAT](https://optixthreatintelligence.co.uk/intel/njrat-malware) - [Ursnif (Gozi)](https://optixthreatintelligence.co.uk/intel/ursnif-gozi) - [TrickBot](https://optixthreatintelligence.co.uk/intel/trickbot-malware) - [Dridex](https://optixthreatintelligence.co.uk/intel/dridex-malware) - [BumbleBee](https://optixthreatintelligence.co.uk/intel/bumblebee-malware) - [RedLine Stealer](https://optixthreatintelligence.co.uk/intel/redline-stealer) - [Agent Tesla](https://optixthreatintelligence.co.uk/intel/agent-tesla) - [Vidar Stealer](https://optixthreatintelligence.co.uk/intel/vidar-stealer) - [GuLoader](https://optixthreatintelligence.co.uk/intel/guloader-malware) - [FormBook](https://optixthreatintelligence.co.uk/intel/formbook-malware) - [PlugX](https://optixthreatintelligence.co.uk/intel/plugx-malware) - [Brute Ratel C4](https://optixthreatintelligence.co.uk/intel/brute-ratel-c4) - [Havoc](https://optixthreatintelligence.co.uk/intel/havoc-c2) - [StealC](https://optixthreatintelligence.co.uk/intel/stealc-malware) - [ShadowPad](https://optixthreatintelligence.co.uk/intel/plugx-shadowpad) - [Industroyer (CRASHOVERRIDE)](https://optixthreatintelligence.co.uk/intel/industroyer-malware) - [LockBit 3.0](https://optixthreatintelligence.co.uk/intel/lockbit-3-analysis) - [Conti Leaks](https://optixthreatintelligence.co.uk/intel/conti-leaks-analysis) ### CVE & Vulnerability Classes - [Log4Shell (CVE-2021-44228)](https://optixthreatintelligence.co.uk/intel/log4shell-cve-2021-44228) - [ProxyLogon](https://optixthreatintelligence.co.uk/intel/proxylogon-cve-2021-26855) - [Zerologon](https://optixthreatintelligence.co.uk/intel/zerologon-cve-2020-1472) - [MOVEit Transfer SQL Injection](https://optixthreatintelligence.co.uk/intel/moveit-cve-2023-34362) - [Citrix Bleed](https://optixthreatintelligence.co.uk/intel/citrix-bleed-cve-2023-4966) - [Fortinet Authentication Bypass](https://optixthreatintelligence.co.uk/intel/fortinet-cve-2022-40684) - [Atlassian Confluence CVE-2022-26134](https://optixthreatintelligence.co.uk/intel/atlassian-confluence-cve-2022-26134) - [Spring4Shell](https://optixthreatintelligence.co.uk/intel/spring4shell-cve-2022-22965) - [VMware ESXi CVE-2021-22005](https://optixthreatintelligence.co.uk/intel/vmware-esxi-cve-2021-22005) - [PrintNightmare](https://optixthreatintelligence.co.uk/intel/printnightmare-cve-2021-1675) - [ProxyShell](https://optixthreatintelligence.co.uk/intel/proxyshell-cve-2021-34473) - [EternalBlue (MS17-010)](https://optixthreatintelligence.co.uk/intel/eternalblue-ms17-010) - [PaperCut CVE-2023-27350](https://optixthreatintelligence.co.uk/intel/papercut-cve-2023-27350) - [Barracuda ESG CVE-2023-2868](https://optixthreatintelligence.co.uk/intel/barracuda-cve-2023-2868) - [Cisco IOS XE CVE-2023-20198](https://optixthreatintelligence.co.uk/intel/cisco-ios-xe-cve-2023-20198) - [Ivanti Connect Secure CVE-2023-46805](https://optixthreatintelligence.co.uk/intel/ivanti-cve-2023-46805) - [GoAnywhere MFT CVE-2023-0669](https://optixthreatintelligence.co.uk/intel/goanywhere-cve-2023-0669) - [TeamCity CVE-2024-27198](https://optixthreatintelligence.co.uk/intel/jetbrains-teamcity-cve-2024-27198) - [ScreenConnect CVE-2024-1709](https://optixthreatintelligence.co.uk/intel/connectwise-screenconnect-cve-2024-1709) - [PAN-OS CVE-2024-3400](https://optixthreatintelligence.co.uk/intel/palo-alto-pan-os-cve-2024-3400) - [F5 BIG-IP CVE-2023-46747](https://optixthreatintelligence.co.uk/intel/f5-big-ip-cve-2023-46747) ### MITRE ATT&CK Techniques - [MITRE ATT&CK T1566](https://optixthreatintelligence.co.uk/intel/t1566-phishing) - [MITRE ATT&CK T1059](https://optixthreatintelligence.co.uk/intel/t1059-command-scripting-interpreter) - [MITRE ATT&CK T1078](https://optixthreatintelligence.co.uk/intel/t1078-valid-accounts) - [T1190](https://optixthreatintelligence.co.uk/intel/t1190-exploit-public-facing-application) - [MITRE ATT&CK T1003](https://optixthreatintelligence.co.uk/intel/t1003-credential-dumping) - [MITRE ATT&CK T1021](https://optixthreatintelligence.co.uk/intel/t1021-remote-services) - [MITRE ATT&CK T1071](https://optixthreatintelligence.co.uk/intel/t1071-application-layer-protocol) - [MITRE ATT&CK T1055](https://optixthreatintelligence.co.uk/intel/t1055-process-injection) - [MITRE ATT&CK T1547](https://optixthreatintelligence.co.uk/intel/t1547-boot-autostart) - [MITRE ATT&CK T1486](https://optixthreatintelligence.co.uk/intel/t1486-data-encrypted-for-impact) - [MITRE ATT&CK T1053](https://optixthreatintelligence.co.uk/intel/t1053-scheduled-task-job) - [MITRE ATT&CK T1110](https://optixthreatintelligence.co.uk/intel/t1110-brute-force) - [MITRE ATT&CK T1087](https://optixthreatintelligence.co.uk/intel/t1087-account-discovery) - [MITRE ATT&CK T1562](https://optixthreatintelligence.co.uk/intel/t1562-impair-defenses) - [MITRE ATT&CK T1041](https://optixthreatintelligence.co.uk/intel/t1041-exfiltration-over-c2) - [MITRE ATT&CK T1195](https://optixthreatintelligence.co.uk/intel/t1195-supply-chain-compromise) - [T1059.001 PowerShell](https://optixthreatintelligence.co.uk/intel/t1059-001-powershell) - [T1059.003 Windows Command Shell](https://optixthreatintelligence.co.uk/intel/t1059-003-windows-command-shell) - [T1078.002 Domain Accounts](https://optixthreatintelligence.co.uk/intel/t1078-002-domain-accounts) - [T1078.004 Cloud Accounts](https://optixthreatintelligence.co.uk/intel/t1078-004-cloud-accounts) - [T1566.001 Spearphishing Attachment](https://optixthreatintelligence.co.uk/intel/t1566-001-spearphishing-attachment) - [T1566.002 Spearphishing Link](https://optixthreatintelligence.co.uk/intel/t1566-002-spearphishing-link) - [T1105 Ingress Tool Transfer](https://optixthreatintelligence.co.uk/intel/t1105-ingress-tool-transfer) - [T1027 Obfuscated Files or Information](https://optixthreatintelligence.co.uk/intel/t1027-obfuscated-files) - [T1082 System Information Discovery](https://optixthreatintelligence.co.uk/intel/t1082-system-information-discovery) - [T1046 Network Service Discovery](https://optixthreatintelligence.co.uk/intel/t1046-network-service-discovery) - [T1548 Abuse Elevation Control](https://optixthreatintelligence.co.uk/intel/t1548-abuse-elevation-control) - [T1218 Signed Binary Proxy Execution](https://optixthreatintelligence.co.uk/intel/t1218-signed-binary-proxy-execution) - [T1070 Indicator Removal](https://optixthreatintelligence.co.uk/intel/t1070-indicator-removal) - [T1112 Modify Registry](https://optixthreatintelligence.co.uk/intel/t1112-modify-registry) - [T1204 User Execution](https://optixthreatintelligence.co.uk/intel/t1204-user-execution) - [T1133 External Remote Services](https://optixthreatintelligence.co.uk/intel/t1133-external-remote-services) - [T1136 Create Account](https://optixthreatintelligence.co.uk/intel/t1136-create-account) - [T1134 Access Token Manipulation](https://optixthreatintelligence.co.uk/intel/t1134-access-token-manipulation) - [T1569 System Services](https://optixthreatintelligence.co.uk/intel/t1569-system-services) - [MITRE ATT&CK T1014](https://optixthreatintelligence.co.uk/intel/t1014-rootkit) - [MITRE ATT&CK T1056](https://optixthreatintelligence.co.uk/intel/t1056-input-capture) - [MITRE ATT&CK T1056.001](https://optixthreatintelligence.co.uk/intel/t1056-keylogging) - [MITRE ATT&CK T1210](https://optixthreatintelligence.co.uk/intel/t1210-exploitation-remote-services) - [MITRE ATT&CK T1485](https://optixthreatintelligence.co.uk/intel/t1485-data-destruction) - [MITRE ATT&CK T1539](https://optixthreatintelligence.co.uk/intel/t1539-steal-web-session-cookie) - [MITRE ATT&CK T1574](https://optixthreatintelligence.co.uk/intel/t1574-dll-side-loading) - [T1003.001 LSASS Memory](https://optixthreatintelligence.co.uk/intel/t1003-001-lsass-memory) - [T1059.006 Python](https://optixthreatintelligence.co.uk/intel/t1059-006-python) - [T1190 Exploit Public-Facing Application](https://optixthreatintelligence.co.uk/intel/t1190-web-application-attacks) ### Detection Engineering - [Sigma Rules](https://optixthreatintelligence.co.uk/intel/sigma-detection-rules) - [YARA Rules](https://optixthreatintelligence.co.uk/intel/yara-rules-malware-detection) - [KQL for Threat Hunting](https://optixthreatintelligence.co.uk/intel/kql-threat-hunting-queries) - [Splunk SPL](https://optixthreatintelligence.co.uk/intel/splunk-spl-detection) - [Elastic EQL](https://optixthreatintelligence.co.uk/intel/elastic-eql-detection) - [CrowdStrike LogScale](https://optixthreatintelligence.co.uk/intel/crowdstrike-logscale-detection) - [Detection as Code](https://optixthreatintelligence.co.uk/intel/detection-as-code) - [MITRE ATT&CK Coverage](https://optixthreatintelligence.co.uk/intel/mitre-attack-coverage) - [Reducing False Positives](https://optixthreatintelligence.co.uk/intel/false-positive-reduction) - [Threat Hunting](https://optixthreatintelligence.co.uk/intel/threat-hunting-methodology) - [Suricata IDS](https://optixthreatintelligence.co.uk/intel/suricata-ids-rules) - [STIX 2.1 and TAXII 2.1](https://optixthreatintelligence.co.uk/intel/stix-taxii-threat-sharing) - [Zeek (Bro)](https://optixthreatintelligence.co.uk/intel/zeek-network-monitoring) - [Velociraptor](https://optixthreatintelligence.co.uk/intel/velociraptor-dfir) - [The Threat Intelligence Lifecycle](https://optixthreatintelligence.co.uk/intel/threat-intelligence-lifecycle) - [The Diamond Model](https://optixthreatintelligence.co.uk/intel/diamond-model-intrusion-analysis) - [User and Entity Behaviour Analytics (UEBA)](https://optixthreatintelligence.co.uk/intel/behavioral-analytics-ueba) - [SOC Metrics and KPIs](https://optixthreatintelligence.co.uk/intel/soc-metrics-kpis) - [OSINT for Threat Hunting](https://optixthreatintelligence.co.uk/intel/threat-hunting-with-osint) - [Ransomware Defence Playbook](https://optixthreatintelligence.co.uk/intel/ransomware-defence-playbook) - [Cloud Threat Intelligence](https://optixthreatintelligence.co.uk/intel/cloud-security-threat-intelligence) - [Threat Actor Attribution](https://optixthreatintelligence.co.uk/intel/threat-actor-attribution) - [Proactive Threat Hunting](https://optixthreatintelligence.co.uk/intel/proactive-threat-hunting-guide) - [Data Exfiltration Detection](https://optixthreatintelligence.co.uk/intel/data-exfiltration-detection) - [Vulnerability Prioritisation](https://optixthreatintelligence.co.uk/intel/vulnerability-prioritisation) - [IOC Enrichment](https://optixthreatintelligence.co.uk/intel/ioc-enrichment-workflows) - [Integrating Threat Intelligence into Incident Response Investigations](https://optixthreatintelligence.co.uk/intel/incident-response-threat-intelligence) ### Indicators of Compromise - [IP Address IOCs](https://optixthreatintelligence.co.uk/intel/ip-address-indicators) - [Domain IOCs](https://optixthreatintelligence.co.uk/intel/domain-indicators) - [File Hash IOCs](https://optixthreatintelligence.co.uk/intel/file-hash-indicators) - [URL IOCs](https://optixthreatintelligence.co.uk/intel/url-indicators) - [Email IOCs](https://optixthreatintelligence.co.uk/intel/email-indicators) - [Network IOCs](https://optixthreatintelligence.co.uk/intel/network-traffic-indicators) - [Mutex IOCs](https://optixthreatintelligence.co.uk/intel/mutex-indicators) - [Registry Key IOCs](https://optixthreatintelligence.co.uk/intel/registry-key-indicators) - [Certificate IOCs](https://optixthreatintelligence.co.uk/intel/certificate-indicators) - [JA3 and JA4 TLS Fingerprints](https://optixthreatintelligence.co.uk/intel/ja3-ja4-tls-fingerprints) - [JARM](https://optixthreatintelligence.co.uk/intel/jarm-fingerprints) - [User-Agent String Indicators](https://optixthreatintelligence.co.uk/intel/user-agent-indicators) - [PE File Indicators](https://optixthreatintelligence.co.uk/intel/pe-file-indicators) - [Memory Artifacts as IOCs](https://optixthreatintelligence.co.uk/intel/memory-artifact-indicators) - [Autonomous System Number (ASN) Indicators](https://optixthreatintelligence.co.uk/intel/asn-network-indicators) - [DNS Indicators](https://optixthreatintelligence.co.uk/intel/dns-indicators) ### SIEM Platform Integrations - [Microsoft Sentinel Threat Intelligence](https://optixthreatintelligence.co.uk/intel/microsoft-sentinel-threat-intelligence) - [Splunk Threat Intelligence](https://optixthreatintelligence.co.uk/intel/splunk-threat-intelligence-integration) - [Elastic Security Threat Intelligence](https://optixthreatintelligence.co.uk/intel/elastic-security-threat-intelligence) - [CrowdStrike Falcon Intelligence](https://optixthreatintelligence.co.uk/intel/crowdstrike-falcon-intelligence) - [IBM QRadar Threat Intelligence](https://optixthreatintelligence.co.uk/intel/ibm-qradar-threat-intelligence) - [Google Chronicle](https://optixthreatintelligence.co.uk/intel/google-chronicle-threat-intelligence) - [SentinelOne Singularity](https://optixthreatintelligence.co.uk/intel/sentinelone-threat-intelligence) - [MISP](https://optixthreatintelligence.co.uk/intel/misp-threat-sharing) - [Palo Alto Cortex XDR](https://optixthreatintelligence.co.uk/intel/palo-alto-cortex-xdr-intelligence) - [Sumo Logic Threat Intelligence](https://optixthreatintelligence.co.uk/intel/sumo-logic-threat-intelligence) - [Datadog Security Monitoring](https://optixthreatintelligence.co.uk/intel/datadog-security-monitoring) - [LogRhythm SIEM](https://optixthreatintelligence.co.uk/intel/logrhythm-threat-intelligence) - [Exabeam](https://optixthreatintelligence.co.uk/intel/exabeam-threat-intelligence) - [ArcSight SIEM](https://optixthreatintelligence.co.uk/intel/arcsight-threat-intelligence) - [Securonix](https://optixthreatintelligence.co.uk/intel/securonix-threat-intelligence) - [Devo](https://optixthreatintelligence.co.uk/intel/devo-security-operations) ### Industry & Sector Threat Briefs - [Healthcare Cybersecurity](https://optixthreatintelligence.co.uk/intel/healthcare-cyber-threats) - [Financial Services Cybersecurity](https://optixthreatintelligence.co.uk/intel/financial-sector-cyber-threats) - [Critical Infrastructure Cybersecurity](https://optixthreatintelligence.co.uk/intel/critical-infrastructure-threats) - [Energy Sector Cybersecurity](https://optixthreatintelligence.co.uk/intel/energy-sector-cyber-threats) - [Government Cybersecurity](https://optixthreatintelligence.co.uk/intel/government-cyber-threats) - [Manufacturing Cybersecurity](https://optixthreatintelligence.co.uk/intel/manufacturing-cyber-threats) - [Education Sector Cybersecurity](https://optixthreatintelligence.co.uk/intel/education-cyber-threats) - [Technology Sector Cybersecurity](https://optixthreatintelligence.co.uk/intel/technology-sector-threats) - [Retail Cybersecurity](https://optixthreatintelligence.co.uk/intel/retail-sector-cyber-threats) - [Supply Chain Cyber Attacks](https://optixthreatintelligence.co.uk/intel/supply-chain-attacks) - [Transport Cybersecurity](https://optixthreatintelligence.co.uk/intel/transport-sector-cyber-threats) - [Media and Broadcasting Cybersecurity](https://optixthreatintelligence.co.uk/intel/media-cyber-threats) - [Legal Services Cybersecurity](https://optixthreatintelligence.co.uk/intel/legal-sector-cyber-threats) - [Pharmaceutical Cybersecurity](https://optixthreatintelligence.co.uk/intel/pharmaceuticals-cyber-threats) - [Telecoms Cybersecurity](https://optixthreatintelligence.co.uk/intel/telecommunications-cyber-threats) - [Aerospace and Defence Cybersecurity](https://optixthreatintelligence.co.uk/intel/aerospace-defence-cyber-threats) - [Maritime Cybersecurity](https://optixthreatintelligence.co.uk/intel/maritime-cyber-threats) - [Insurance Cybersecurity](https://optixthreatintelligence.co.uk/intel/insurance-sector-cyber-threats) - [Oil and Gas Cybersecurity](https://optixthreatintelligence.co.uk/intel/oil-gas-cyber-threats) - [Hospital OT Security](https://optixthreatintelligence.co.uk/intel/hospital-ot-cyber-threats) ## Legal - [Terms of Service](https://optixthreatintelligence.co.uk/legal/terms) - [Privacy Policy](https://optixthreatintelligence.co.uk/legal/privacy) - [Acceptable Use Policy](https://optixthreatintelligence.co.uk/legal/acceptable-use) - [Refund Policy](https://optixthreatintelligence.co.uk/legal/refund) - [Data Processing Agreement](https://optixthreatintelligence.co.uk/legal/dpa) ## Sitemap https://optixthreatintelligence.co.uk/sitemap.xml