All Posts
ThreatStream
1
min read

New in ThreatStream: Certego Threat Intelligence Feeds

Certego threat intelligence is now available in the Anomali Preferred Partner store. These data feeds provide EU and Italy-focused threat intelligence and categorize malicious IPs and domains by type and reliability.
Published on
March 13, 2025
Table of Contents

Certego’s threat intelligence modules are the latest addition to ThreatStream’s massive repository of relevant IoCs and IoAs. ThreatStream offers four distinct feeds from Certego: malware, phishing, sinkhole, and hash detection.

Founded in 2013 and headquartered in Modena, Italy, Certego’s team has extensive experience in security intelligence, incident response, and malware analysis. In addition to Certego’s threat intelligence offerings, the company provides Managed Detection and Response (MDR) services and a Unified Security Operations platform, PanOptikon®.

Activating Certego Intelligence in ThreatStream

As a premium feed, activating Certego’s data feeds in ThreatStream requires a subscription to Certego’s threat intelligence modules. Setting up these feeds in ThreatStream is quick and easy: users simply activate the Certego Data Feeds tile within the ThreatStream APP store and provide their Certego Token.

Four feeds from Certego with actionable, tactical intelligence are now available in ThreatStream:

  1. Malware: Provides domain records and IP addresses associated with malware
  2. Phishing: Provides domain records and IP addresses associated with phishing attacks
  3. Sinkhole: Tracks malicious sites used in DNS sinkhole redirection
  4. Hash: Allows security analysts to quickly identify malicious files by comparing MD5 hash values
A screenshot of Certego data feeds in the ThreatStream APP Store
A screenshot of Certego data feeds in the ThreatStream APP Store

Get Started with Certego and ThreatStream

Visit the Certego website to learn more about its threat intelligence modules, or schedule a demo with Anomali to see how ThreatStream provides access to the industry's largest curated global repository of threat intelligence, including new premium intelligence feeds from Certego.

FEATURED RESOURCES

February 10, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Notepad++ Attack, RAT Uses Hugging Face, Microsoft Office Flaw and more

Notepad++ Supply Chain Attack Delivers Chrysalis Backdoor. Android RAT Uses Hugging Face Platform to Host Malicious Payloads. Fancy Bear Exploits Microsoft Office Flaw in Ukraine. Nitrogen Ransomware Decryptor Fails Due to Coding Error. And more...
Read More
February 3, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Stanley Malware Toolkit, ShinyHunters, Vulnerability in WhatsApp and more

Stanley Malware Toolkit Abuses Browser Extensions to Enable URL-Trusted Phishing. ShinyHunters Linked to Large-Scale Okta SSO Credential Harvesting via Voice Phishing. Silent Media Chain Vulnerability in WhatsApp Group Chats. And more...
Read More
February 5, 2026
Anomali

Anomali Earns Committed Badge from EcoVadis for Sustainability Performance

Read More
Explore All