All Posts
ThreatStream
1
min read

New in ThreatStream: Certego Threat Intelligence Feeds

Certego threat intelligence is now available in the Anomali Preferred Partner store. These data feeds provide EU and Italy-focused threat intelligence and categorize malicious IPs and domains by type and reliability.
Published on
March 13, 2025
Table of Contents

Certego’s threat intelligence modules are the latest addition to ThreatStream’s massive repository of relevant IoCs and IoAs. ThreatStream offers four distinct feeds from Certego: malware, phishing, sinkhole, and hash detection.

Founded in 2013 and headquartered in Modena, Italy, Certego’s team has extensive experience in security intelligence, incident response, and malware analysis. In addition to Certego’s threat intelligence offerings, the company provides Managed Detection and Response (MDR) services and a Unified Security Operations platform, PanOptikon®.

Activating Certego Intelligence in ThreatStream

As a premium feed, activating Certego’s data feeds in ThreatStream requires a subscription to Certego’s threat intelligence modules. Setting up these feeds in ThreatStream is quick and easy: users simply activate the Certego Data Feeds tile within the ThreatStream APP store and provide their Certego Token.

Four feeds from Certego with actionable, tactical intelligence are now available in ThreatStream:

  1. Malware: Provides domain records and IP addresses associated with malware
  2. Phishing: Provides domain records and IP addresses associated with phishing attacks
  3. Sinkhole: Tracks malicious sites used in DNS sinkhole redirection
  4. Hash: Allows security analysts to quickly identify malicious files by comparing MD5 hash values
A screenshot of Certego data feeds in the ThreatStream APP Store
A screenshot of Certego data feeds in the ThreatStream APP Store

Get Started with Certego and ThreatStream

Visit the Certego website to learn more about its threat intelligence modules, or schedule a demo with Anomali to see how ThreatStream provides access to the industry's largest curated global repository of threat intelligence, including new premium intelligence feeds from Certego.

FEATURED RESOURCES

January 20, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Remcos RAT, BitB phishing, Linux Malware Framework, Supply Chain Intrusion and more

New Malware Campaign Delivers Remcos RAT Through Text-Only Staging and Living-Off-the-Land Execution. Browser-in-the-Browser Phishing Evolves into a High-Fidelity Credential Trap. Cloud-Aware Linux Malware Framework Poised for Future Threats. And More..
Read More
January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
Explore All