All Posts
ThreatStream
1
min read

Shadowserver Intelligence Reports Are Now Available For Free in ThreatStream

Anomali is excited to add Shadowserver intelligence reporting to the Anomali Preferred Partner store.
Published on
February 24, 2025
Table of Contents

Daily intelligence reports from Shadowserver are now available as a free threat intelligence feed in the Anomali Preferred Partner store – enabling customers to create free daily potential attack surface reports and identify potential malware and other malicious activities relevant to their network or constituency.

About Shadowserver Network Reporting

The Shadowserver Foundation is a nonprofit security organization dedicated to bringing malicious activities and abusable vulnerabilities to light, expediting their remediation, and helping to better secure the Internet. The organization sends custom remediation reports to more than 9,000 vetted subscribers, including national governments, network providers, enterprises, financial and academic institutions, law enforcement agencies, and more.

Shadowserver’s Network Reports are detailed, targeted, relevant, free, and actionable. The report data is sourced from daily Internet-wide scans, honeypot sensors, sinkholes, sandboxes, blocklists, and many other sources.

Activating Shadowserver Reports in ThreatStream

Activating Shadowserver reporting in ThreatStream is free and easy. ThreatStream users can simply:

  1. Sign up for Shadowserver reporting here
  2. Obtain your Secret Key and API Token
  3. Active the Shadowserver APP Store Tile within Threatstream and submit your credentials to start receiving alerts

Shadowserver delivers new reports every day, which ThreatStream correlates with other intelligence sources, deduplicates, and contextualizes.

You can visit the Shadowserver website to learn more about their network reporting, or schedule a demo with Anomali to see how ThreatStream provides curated access to the industry's largest global repository of threat intelligence – which now includes Shadowserver reporting.

FEATURED RESOURCES

January 20, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Remcos RAT, BitB phishing, Linux Malware Framework, Supply Chain Intrusion and more

New Malware Campaign Delivers Remcos RAT Through Text-Only Staging and Living-Off-the-Land Execution. Browser-in-the-Browser Phishing Evolves into a High-Fidelity Credential Trap. Cloud-Aware Linux Malware Framework Poised for Future Threats. And More..
Read More
January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
Explore All