Use Cases
Defused offers a comprehensive set of use cases for collected real-time telemetry:
Blocklisting
Use attacker IPs, payloads, and behavioral patterns from Defused telemetry to build or enrich blocklists for perimeter devices, WAFs, firewalls, and cloud controls.
Detection Writing
Leverage high-fidelity exploit and enumeration activity from honeypots to create or refine SIEM/SOAR detection rules, queries, signatures, and enrichment logic.
Threat Research
Analyze payloads, exploit attempts, scanning patterns, and attacker tooling to support rapid threat research, malware triage, and exploit replication.
Data Correlation
Correlate Defused telemetry with internal logs, EDR events, perimeter alerts, and vulnerability data to identify targeted activity or shared indicators.
0/N-day Searching
Search telemetry for known or emerging vulnerabilities (0-day and n-day) to track exploit attempts, validate exposure, and monitor attacker interest in specific CVEs.