PARTNERSHIPS

Unit 42 Threat Intelligence Sharing Partnerships

We maintain robust threat intelligence sharing partnerships with the U.S. Department of Homeland Security, the Cyber Threat Alliance, or CTA (of which we’re a founding member), the intelligence community and international law enforcement and government agencies.
THREAT INTELLIGENCE SHARING

We’re committed to sharing threat intelligence


As a global security leader, we have insight into attacks occurring across every industry and all around the world. Unit 42TM has a deep, long-standing commitment to partnering with responsible governments and international intelligence communities around the globe sharing threat intelligence on emerging threats long before the world is aware of them.

HOW IT WORKS

Information sharing to information enabling


As vulnerabilities at the scale of Log4Shell threaten organizations around the globe, it’s more important than ever to create and build on initiatives that allow us to share information and transform it into actionable recommendations that help organizations defend against today’s cyberthreats.

LEARN

Discover actionable threat intelligence

Our threat intelligence experts uncover indicators of compromise or insights into active attacks and threat actors.

SHARE

Share with trusted partners

We share our findings with trusted partners in industry, government and law enforcement to support the response to the threat.

PROTECT

Cybersecurity community protects users

Organizations apply key insights to products, incident response efforts and law enforcement investigations.

Threat Intelligence

Unit 42 Threat Intelligence Sharing


Learn how Unit 42 is working with government and industry partners to improve global response to cyberthreats.

SHARED THREAT INTELLIGENCE

Supporting government and industry response to cyber incidents


Threat intelligence is most powerful when openly shared for the good of everyone. We share threat intelligence with trusted partners and take pride in how our experts and engineers apply that information to help our customers.

Related resources

WEBSITE

The Cyber Threat Alliance: Sharing Threat Intelligence for Five Years

THREAT RESEARCH

Operation Falcon II: Unit 42 Helps INTERPOL Identify Nigerian Business Email Compromise Ring Members.

BLOG

Cyber Operational Collaboration Is Key for the “Next Log4j” Response

jeffries-logo

Intelligence – shared and applied

Our consultants apply shared threat intelligence to help assess and test your security controls against the right threats, transform your security strategy with an intelligence-informed approach and respond to incidents in record time.
By submitting this form, you agree to our Terms. View our Privacy Statement.