{"total":6,"offset":0,"limit":6,"data":[{"logo":"securitytrails-full","title":"SecurityTrails","description":"Comprehensive domain and IP address data for users and applications that demand clarity.","link":"https://securitytrails.com/"},{"logo":"gemini-full","title":"Gemini Advisory","description":"Data-driven Fraud Intelligence solutions to prevent fraud before it occurs.","link":"https://geminiadvisory.io/"},{"logo":"ctci-full","title":"Cyber Threat Cognitive Intelligence (CTCI)","description":"CVE intelligence on exploited or soon to be exploited vulnerabilities.","link":"https://www.armis.com/"},{"logo":"realitydefender-full","title":"Reality Defender","description":"An enterprise-grade platform to test for synthetically altered images and videos.","link":"https://www.realitydefender.com/"},{"logo":"hunt-full","title":"Hunt.io","description":"Persistent detection of malicious infrastructure and threat actor tooling.","link":"https://hunt.io/"},{"logo":"geospy-full","title":"GeoSpy AI","description":"Advanced photo geolocation using deep learning.","link":"https://geospy.ai/"}],"columns":["logo","title","description","link"],":type":"sheet"}