Threat Sourcing

About

Threat data is only published when an attack has occured. Not a scan, not some sort of probe. Only after an actual attempt to compromise a host on the Internet.

Quality trumps quantity

Feedback is welcome: Brian's Twitter