{"id":2255,"date":"2025-11-25T10:34:10","date_gmt":"2025-11-25T10:34:10","guid":{"rendered":"https:\/\/www.newevol.io\/resources\/?p=2255"},"modified":"2025-11-25T10:34:11","modified_gmt":"2025-11-25T10:34:11","slug":"best-threat-intelligence-for-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/","title":{"rendered":"Top Threat Intelligence Sources to Stay Ahead of Cyber Attacks"},"content":{"rendered":"<p>In Malaysia&rsquo;s rapidly digitalising economy, cybersecurity has become a top national and business priority. Financial institutions, telecom providers, manufacturing giants, and government agencies are accelerating their digital transformation &mdash; but this growth also brings an expanding attack surface. Malaysia <a href=\"https:\/\/securitybrief.asia\/story\/malaysia-sees-rise-in-ransomware-as-firms-urged-to-shift-culture\" target=\"_blank\" rel=\"nofollow noopener\">experienced a 35% increase in cyber incidents in 2024<\/a>, driven by phishing, ransomware, and supply chain attacks.<\/p>\n<p>From phishing campaigns and ransomware to supply-chain intrusions, the threats are evolving faster than traditional defenses can adapt. Staying ahead requires threat intelligence &mdash; actionable insights that transform raw data into foresight.<\/p>\n<p>But with so many feeds, sources, and platforms available, how can Malaysian organisations choose the right ones? This article explores:<\/p>\n<ul>\n<li>The role of threat intelligence in <strong><a href=\"https:\/\/www.sattrix.com\/malaysia\/\">modern cybersecurity<\/a><\/strong>,<\/li>\n<li>The top global and regional threat intelligence sources, and<\/li>\n<li>How NewEvol delivers an adaptive, AI-driven threat intelligence ecosystem for Malaysian enterprises.<\/li>\n<\/ul>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_66_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title ez-toc-toggle\" style=\"cursor: pointer\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #0a0a0a;color:#0a0a0a\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #0a0a0a;color:#0a0a0a\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#Why_Threat_Intelligence_Matters_More_Than_Ever\" title=\"Why Threat Intelligence Matters More Than Ever\">Why Threat Intelligence Matters More Than Ever<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#Types_of_Threat_Intelligence_Sources\" title=\"Types of Threat Intelligence Sources\">Types of Threat Intelligence Sources<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#1_Open_Source_Intelligence_OSINT\" title=\"1. Open Source Intelligence (OSINT)\">1. Open Source Intelligence (OSINT)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#2_Commercial_Intelligence_Feeds\" title=\"2. Commercial Intelligence Feeds\">2. Commercial Intelligence Feeds<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#3_Industry_and_Regional_Sharing_Groups\" title=\"3. Industry and Regional Sharing Groups\">3. Industry and Regional Sharing Groups<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#4_Internal_Intelligence_Sources\" title=\"4. Internal Intelligence Sources\">4. Internal Intelligence Sources<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#5_Integrated_Threat_Intelligence_Platforms_TIPs\" title=\"5. Integrated Threat Intelligence Platforms (TIPs)\">5. Integrated Threat Intelligence Platforms (TIPs)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#Top_Threat_Intelligence_Sources\" title=\"Top Threat Intelligence Sources\">Top Threat Intelligence Sources<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#1_MITRE_ATT_CK_Framework\" title=\"1. MITRE ATT&amp;CK Framework\">1. MITRE ATT&amp;CK Framework<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#2_VirusTotal_Intelligence\" title=\"2. VirusTotal Intelligence\">2. VirusTotal Intelligence<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#3_AlienVault_Open_Threat_Exchange_OTX\" title=\"3. AlienVault Open Threat Exchange (OTX)\">3. AlienVault Open Threat Exchange (OTX)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#4_IBM_X-Force_Exchange\" title=\"4. IBM X-Force Exchange\">4. IBM X-Force Exchange<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#5_Recorded_Future\" title=\"5. Recorded Future\">5. Recorded Future<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#6_Malaysian_National_Cyber_Coordination_MyCERT_CyberSecurity_Malaysia\" title=\"6. Malaysian National Cyber Coordination (MyCERT \/ CyberSecurity Malaysia)\">6. Malaysian National Cyber Coordination (MyCERT \/ CyberSecurity Malaysia)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#Why_Global_Feeds_Alone_Arent_Enough\" title=\"Why Global Feeds Alone Aren&rsquo;t Enough\">Why Global Feeds Alone Aren&rsquo;t Enough<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#NewEvol_Threat_Intelligence_%E2%80%93_Context_that_Powers_Action\" title=\"NewEvol Threat Intelligence &ndash; Context that Powers Action\">NewEvol Threat Intelligence &ndash; Context that Powers Action<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#1_Unified_Threat_Intelligence_Ecosystem\" title=\"1. Unified Threat Intelligence Ecosystem\">1. Unified Threat Intelligence Ecosystem<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#2_Machine_Learning_Contextual_Analytics\" title=\"2. Machine Learning &amp; Contextual Analytics\">2. Machine Learning &amp; Contextual Analytics<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#3_Real-Time_Threat_Correlation\" title=\"3. Real-Time Threat Correlation\">3. Real-Time Threat Correlation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#4_Regional_Adaptability\" title=\"4. Regional Adaptability\">4. Regional Adaptability<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#5_Seamless_SIEM_SOAR_Integration\" title=\"5. Seamless SIEM &amp; SOAR Integration\">5. Seamless SIEM &amp; SOAR Integration<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#6_Actionable_Insights_Not_Just_Data\" title=\"6. Actionable Insights, Not Just Data\">6. Actionable Insights, Not Just Data<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#Benefits_for_Malaysian_Organisations\" title=\"Benefits for Malaysian Organisations\">Benefits for Malaysian Organisations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#Building_an_Intelligence-Driven_Security_Culture\" title=\"Building an Intelligence-Driven Security Culture\">Building an Intelligence-Driven Security Culture<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#FAQs\" title=\"FAQs\">FAQs<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#1_What_are_threat_intelligence_sources\" title=\"1. What are threat intelligence sources?\">1. What are threat intelligence sources?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#2_Why_is_threat_intelligence_important_for_Malaysia\" title=\"2. Why is threat intelligence important for Malaysia?\">2. Why is threat intelligence important for Malaysia?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#3_How_does_NewEvol_improve_threat_intelligence\" title=\"3. How does NewEvol improve threat intelligence?\">3. How does NewEvol improve threat intelligence?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#4_Can_NewEvol_integrate_with_existing_SOC_tools\" title=\"4. Can NewEvol integrate with existing SOC tools?\">4. Can NewEvol integrate with existing SOC tools?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#5_Is_NewEvol_suitable_for_regulated_industries_in_Malaysia\" title=\"5. Is NewEvol suitable for regulated industries in Malaysia?\">5. Is NewEvol suitable for regulated industries in Malaysia?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Why_Threat_Intelligence_Matters_More_Than_Ever\"><\/span><span style=\"color: #065c62;\">Why Threat Intelligence Matters More Than Ever<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Threat intelligence (TI) is not just about collecting indicators of compromise (IoCs) &mdash; it&rsquo;s about understanding who, why, and how behind every attack. In Malaysia&rsquo;s context, threat actors often target sectors with high data value or national significance: banking, energy, critical infrastructure, and government services. <a href=\"https:\/\/securityquotient.io\/understanding-malaysias-cyber-threat-landscape-a-2025-outlook\" target=\"_blank\" rel=\"nofollow noopener\">The ASEAN region faced over 280 million cyberattacks in 2024<\/a>, with Malaysia among the top three most frequently targeted countries.<\/p>\n<p>According to industry studies, over 60% of Malaysian organisations experienced at least one cyber incident in the past year. The average dwell time &mdash; how long attackers remain undetected &mdash; is still too high, often measured in weeks.<\/p>\n<p>Threat intelligence helps bridge that gap. It empowers security teams to:<\/p>\n<ul>\n<li>Anticipate attacks before they strike.<\/li>\n<li>Correlate data across logs, endpoints, and networks for faster detection.<\/li>\n<li>Inform response decisions with context &mdash; attacker motives, techniques, and history.<\/li>\n<li>Strengthen defenses based on evolving global and regional threat trends.<\/li>\n<\/ul>\n<p>The ultimate goal: transforming your SOC from reactive to predictive.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Types_of_Threat_Intelligence_Sources\"><\/span><span style=\"color: #065c62;\">Types of Threat Intelligence Sources<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Before listing the top platforms, it&rsquo;s important to understand the categories of threat intelligence sources commonly used in SOCs and CERTs across Malaysia:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_Open_Source_Intelligence_OSINT\"><\/span><span style=\"font-size: 70%;\">1. Open Source Intelligence (OSINT)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Freely available public data &mdash; including feeds from government, research labs, and community projects &mdash; that provide early warnings and IOCs.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_Commercial_Intelligence_Feeds\"><\/span><span style=\"font-size: 70%;\">2. Commercial Intelligence Feeds<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Paid subscriptions that deliver curated, high-confidence threat data, often enriched with<strong> <a href=\"https:\/\/www.newevol.io\/resources\/blog\/cyber-security\/uba-strategies-for-us-businesses-2025\/\">behavior analytics<\/a> <\/strong>and attribution details.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_Industry_and_Regional_Sharing_Groups\"><\/span><span style=\"font-size: 70%;\">3. Industry and Regional Sharing Groups<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Collaboration forums such as the Malaysia Cyber Security Network (MyCERT), APCERT, and sector-based ISACs that share localised intelligence.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_Internal_Intelligence_Sources\"><\/span><span style=\"font-size: 70%;\">4. Internal Intelligence Sources<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Logs, alerts, and telemetry generated by your own infrastructure, SIEM, and endpoint tools. These form the foundation for custom analytics and hunting.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_Integrated_Threat_Intelligence_Platforms_TIPs\"><\/span><span style=\"font-size: 70%;\">5. Integrated Threat Intelligence Platforms (TIPs)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Platforms that aggregate, normalise, and analyse data from multiple sources &mdash; converting it into contextual, actionable intelligence for your SOC or SIEM.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Top_Threat_Intelligence_Sources\"><\/span><span style=\"color: #065c62;\">Top Threat Intelligence Sources<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Here&rsquo;s a look at some of the leading global and regional threat intelligence sources that Malaysian organisations can rely on to enhance their visibility and resilience.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_MITRE_ATT_CK_Framework\"><\/span><span style=\"font-size: 70%;\">1. MITRE ATT&amp;CK Framework<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A globally recognised framework mapping adversary tactics and techniques. It helps SOC teams identify attacker behaviour patterns and strengthen detection strategies.<\/p>\n<p><strong>Best For:<\/strong> Building detection rules, analysing adversary behaviour, improving response playbooks.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_VirusTotal_Intelligence\"><\/span><span style=\"font-size: 70%;\">2. VirusTotal Intelligence<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Owned by Google, this platform aggregates data from antivirus vendors and security researchers worldwide. It provides file, domain, and IP reputation insights.<\/p>\n<p><strong>Best For:<\/strong> Malware analysis and URL\/domain reputation checks.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_AlienVault_Open_Threat_Exchange_OTX\"><\/span><span style=\"font-size: 70%;\">3. AlienVault Open Threat Exchange (OTX)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A large open-source community sharing threat indicators, TTPs, and real-time attack data.<\/p>\n<p><strong>Best For:<\/strong> Real-time community-sourced IOCs and malware signatures.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_IBM_X-Force_Exchange\"><\/span><span style=\"font-size: 70%;\">4. IBM X-Force Exchange<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A commercial platform combining global threat data with analytical insights from IBM&rsquo;s research teams.<\/p>\n<p><strong>Best For:<\/strong> Enterprise-level threat enrichment, correlation, and predictive insights.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_Recorded_Future\"><\/span><span style=\"font-size: 70%;\">5. Recorded Future<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>An intelligence platform using machine learning to deliver contextual, real-time insights from open, dark web, and technical sources.<\/p>\n<p><strong>Best For: <a href=\"https:\/\/www.newevol.io\/solutions\/threat-hunting.php\">Threat hunting<\/a><\/strong>, risk scoring, and actor attribution.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"6_Malaysian_National_Cyber_Coordination_MyCERT_CyberSecurity_Malaysia\"><\/span><span style=\"font-size: 70%;\">6. Malaysian National Cyber Coordination (MyCERT \/ CyberSecurity Malaysia)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The national CERT offers advisories, vulnerability alerts, and local threat intelligence feeds specific to Malaysia and Southeast Asia.<\/p>\n<p><strong>Best For:<\/strong> Local threat context, regional advisories, and <strong><a href=\"https:\/\/www.newevol.io\/solutions\/incident-response.php\">incident response<\/a> <\/strong>support.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_Global_Feeds_Alone_Arent_Enough\"><\/span><span style=\"color: #065c62;\">Why Global Feeds Alone Aren&rsquo;t Enough<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While global threat intelligence sources are powerful, they often lack regional context. Attackers operating in Southeast Asia use different infrastructure, language cues, and tactics. For example:<\/p>\n<ul>\n<li>Phishing domains are often hosted on local ISPs or mimic Malaysian banking brands.<\/li>\n<li>Threat actors may exploit region-specific regulatory systems or payment gateways.<\/li>\n<li>Campaigns might be timed with local events or government announcements.<\/li>\n<\/ul>\n<p>This is where context-aware, AI-driven platforms like NewEvol become essential &mdash; fusing global data with regional behaviour analytics.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"NewEvol_Threat_Intelligence_%E2%80%93_Context_that_Powers_Action\"><\/span><span style=\"color: #065c62;\">NewEvol Threat Intelligence &ndash; Context that Powers Action<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Traditional threat feeds are static; they tell you what happened. <a href=\"https:\/\/www.newevol.io\/product\/cyber-threat-intelligence.php\">NewEvol&rsquo;s Threat Intelligence platform<\/a> tells you why it happened &mdash; and what&rsquo;s next.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_Unified_Threat_Intelligence_Ecosystem\"><\/span><span style=\"font-size: 70%;\">1. Unified Threat Intelligence Ecosystem<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>NewEvol consolidates multiple threat data streams &mdash; open-source, commercial, dark web, and internal telemetry &mdash; into a single, AI-powered ecosystem. This unified data model eliminates silos and gives analysts complete visibility across their attack surface.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_Machine_Learning_Contextual_Analytics\"><\/span><span style=\"font-size: 70%;\">2. Machine Learning &amp; Contextual Analytics<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Using advanced ML algorithms, NewEvol correlates indicators, behaviours, and contextual cues from millions of records. It identifies emerging threats early and prioritises them based on real-world risk &mdash; helping Malaysian SOCs focus on what truly matters.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_Real-Time_Threat_Correlation\"><\/span><span style=\"font-size: 70%;\">3. Real-Time Threat Correlation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>NewEvol continuously ingests and enriches data from SIEMs, EDRs, and firewalls. This enables correlation between global intelligence and local telemetry &mdash; ensuring that a global alert becomes an actionable insight within your SOC.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_Regional_Adaptability\"><\/span><span style=\"font-size: 70%;\">4. Regional Adaptability<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Designed with global scalability but regional adaptability, NewEvol supports integration with MyCERT feeds, regional threat exchanges, and regulatory requirements under <a href=\"https:\/\/www.sattrix.com\/blog\/how-pdpa-amendments-impact-businesses\/\">Malaysia&rsquo;s PDPA<\/a> and Bank Negara guidelines.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_Seamless_SIEM_SOAR_Integration\"><\/span><span style=\"font-size: 70%;\">5. Seamless SIEM &amp; SOAR Integration<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Unlike standalone threat feeds, NewEvol&rsquo;s threat intelligence integrates natively with SIEM and SOAR modules. The result: faster detection, automated enrichment, and guided response workflows that align with your SOC operations.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"6_Actionable_Insights_Not_Just_Data\"><\/span><span style=\"font-size: 70%;\">6. Actionable Insights, Not Just Data<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Every indicator in NewEvol is enriched with attribution (actor, motive, source), TTP mapping (MITRE ATT&amp;CK), and relevance scoring. SOC analysts can instantly assess severity and automate decisions &mdash; turning intelligence into immediate defense.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_for_Malaysian_Organisations\"><\/span><span style=\"color: #065c62;\">Benefits for Malaysian Organisations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>By adopting NewEvol&rsquo;s Threat Intelligence capabilities, enterprises across Malaysia can expect:<\/p>\n<ul>\n<li>Early warning of region-specific threats through continuous data correlation.<\/li>\n<li>Reduced investigation time with automated enrichment and contextual prioritisation.<\/li>\n<li>Improved compliance alignment with PDPA and sectoral security frameworks.<\/li>\n<li>Smarter incident response powered by real-time, AI-driven insights.<\/li>\n<li>Seamless SOC integration across SIEM, <strong><a href=\"https:\/\/www.newevol.io\/product\/security-orchestration-automation-response-soar.php\">SOAR<\/a><\/strong>, and case management systems.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Building_an_Intelligence-Driven_Security_Culture\"><\/span><span style=\"color: #065c62;\">Building an Intelligence-Driven Security Culture<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Technology alone isn&rsquo;t enough. Malaysian organisations must combine platforms like NewEvol with a strong intelligence-sharing culture. Establishing partnerships with national and regional bodies such as MyCERT, APCERT, and industry ISACs enhances collaboration and response speed.<\/p>\n<p>Regularly training SOC teams on threat hunting, MITRE ATT&amp;CK mapping, and adversary emulation ensures that your intelligence translates into proactive defense.<\/p>\n<p>When every analyst, process, and system is connected through a unified threat intelligence framework, cybersecurity becomes not just reactive &mdash; but strategic.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><span style=\"color: #065c62;\">Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In an era where attackers are faster, stealthier, and more coordinated, staying ahead requires intelligence that sees beyond alerts. Malaysia&rsquo;s digital future depends on cybersecurity ecosystems that are predictive, contextual, and adaptive.<\/p>\n<p>Platforms like <strong><a href=\"https:\/\/www.newevol.io\/\">NewEvol<\/a> <\/strong>lead this transformation &mdash; integrating machine learning, automation, and regional awareness into a single intelligence fabric that empowers SOCs to defend before damage occurs.<\/p>\n<p>Whether you&rsquo;re a bank, telco, or critical infrastructure operator, NewEvol ensures your defense is one step ahead &mdash; turning intelligence into foresight, and foresight into action.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"FAQs\"><\/span><span style=\"color: #065c62;\">FAQs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"1_What_are_threat_intelligence_sources\"><\/span><span style=\"font-size: 70%;\">1. What are threat intelligence sources?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Threat intelligence sources collect data on attackers, campaigns, and vulnerabilities to help security teams anticipate and prevent cyber threats.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_Why_is_threat_intelligence_important_for_Malaysia\"><\/span><span style=\"font-size: 70%;\">2. Why is threat intelligence important for Malaysia?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Malaysia faces region-specific cyber threats &mdash; threat intelligence helps identify and mitigate these before they cause harm.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_How_does_NewEvol_improve_threat_intelligence\"><\/span><span style=\"font-size: 70%;\">3. How does NewEvol improve threat intelligence?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>NewEvol unifies multiple feeds, applies machine learning, and delivers contextual insights, enabling faster, more accurate detection and response.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_Can_NewEvol_integrate_with_existing_SOC_tools\"><\/span><span style=\"font-size: 70%;\">4. Can NewEvol integrate with existing SOC tools?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes. NewEvol seamlessly integrates with SIEM, SOAR, EDR, and third-party systems to create a cohesive intelligence ecosystem.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_Is_NewEvol_suitable_for_regulated_industries_in_Malaysia\"><\/span><span style=\"font-size: 70%;\">5. Is NewEvol suitable for regulated industries in Malaysia?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Absolutely. NewEvol supports compliance with Malaysia&rsquo;s PDPA, Bank Negara cybersecurity guidelines, and other industry standards.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In Malaysia&rsquo;s rapidly digitalising economy, cybersecurity has become a top national and business priority. Financial institutions, telecom providers, manufacturing giants, and government agencies are accelerating their digital transformation &mdash; but this growth also brings an expanding attack surface. Malaysia experienced a 35% increase in cyber incidents in 2024, driven by phishing, ransomware, and supply chain&hellip; <a class=\"more-link\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/\">Continue reading <span class=\"screen-reader-text\">Top Threat Intelligence Sources to Stay Ahead of Cyber Attacks<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":2256,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,14],"tags":[],"class_list":["post-2255","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-threat-intel","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top Threat Intelligence Sources to Prevent Cyber Attacks Now<\/title>\n<meta name=\"description\" content=\"Explore top threat intelligence sources and see how NewEvol gives Malaysian organisations real-time, AI-powered insights to stay ahead of evolving cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Threat Intelligence Sources to Prevent Cyber Attacks Now\" \/>\n<meta property=\"og:description\" content=\"Explore top threat intelligence sources and see how NewEvol gives Malaysian organisations real-time, AI-powered insights to stay ahead of evolving cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"NewEvol\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NewEvolPlatform\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-25T10:34:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T10:34:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/11\/blog-post-ne-nov_Artboard-1-copy-63.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1921\" \/>\n\t<meta property=\"og:image:height\" content=\"901\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krunal Medapara\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@krunalpatel17\" \/>\n<meta name=\"twitter:site\" content=\"@NewEvolPlatform\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krunal Medapara\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/\",\"url\":\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/\",\"name\":\"Top Threat Intelligence Sources to Prevent Cyber Attacks Now\",\"isPartOf\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/11\/blog-post-ne-nov_Artboard-1-copy-63.jpg\",\"datePublished\":\"2025-11-25T10:34:10+00:00\",\"dateModified\":\"2025-11-25T10:34:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680\"},\"description\":\"Explore top threat intelligence sources and see how NewEvol gives Malaysian organisations real-time, AI-powered insights to stay ahead of evolving cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#primaryimage\",\"url\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/11\/blog-post-ne-nov_Artboard-1-copy-63.jpg\",\"contentUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/11\/blog-post-ne-nov_Artboard-1-copy-63.jpg\",\"width\":1921,\"height\":901,\"caption\":\"threat intelligence sources\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.newevol.io\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top Threat Intelligence Sources to Stay Ahead of Cyber Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#website\",\"url\":\"https:\/\/www.newevol.io\/resources\/\",\"name\":\"NewEvol\",\"description\":\"Innovation in Motion\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.newevol.io\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680\",\"name\":\"Krunal Medapara\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg\",\"contentUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg\",\"caption\":\"Krunal Medapara\"},\"description\":\"Krunal Mendapara is the Chief Technology Officer, responsible for creating product roadmaps from conception to launch, driving the product vision, defining go-to-market strategy, and leading design discussions.\",\"sameAs\":[\"https:\/\/www.newevol.io\/\",\"https:\/\/x.com\/krunalpatel17\"],\"url\":\"https:\/\/www.newevol.io\/resources\/author\/krunal-medapara\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Threat Intelligence Sources to Prevent Cyber Attacks Now","description":"Explore top threat intelligence sources and see how NewEvol gives Malaysian organisations real-time, AI-powered insights to stay ahead of evolving cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Top Threat Intelligence Sources to Prevent Cyber Attacks Now","og_description":"Explore top threat intelligence sources and see how NewEvol gives Malaysian organisations real-time, AI-powered insights to stay ahead of evolving cyber threats.","og_url":"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/","og_site_name":"NewEvol","article_publisher":"https:\/\/www.facebook.com\/NewEvolPlatform\/","article_published_time":"2025-11-25T10:34:10+00:00","article_modified_time":"2025-11-25T10:34:11+00:00","og_image":[{"width":1921,"height":901,"url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/11\/blog-post-ne-nov_Artboard-1-copy-63.jpg","type":"image\/jpeg"}],"author":"Krunal Medapara","twitter_card":"summary_large_image","twitter_creator":"@krunalpatel17","twitter_site":"@NewEvolPlatform","twitter_misc":{"Written by":"Krunal Medapara","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/","url":"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/","name":"Top Threat Intelligence Sources to Prevent Cyber Attacks Now","isPartOf":{"@id":"https:\/\/www.newevol.io\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/11\/blog-post-ne-nov_Artboard-1-copy-63.jpg","datePublished":"2025-11-25T10:34:10+00:00","dateModified":"2025-11-25T10:34:11+00:00","author":{"@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680"},"description":"Explore top threat intelligence sources and see how NewEvol gives Malaysian organisations real-time, AI-powered insights to stay ahead of evolving cyber threats.","breadcrumb":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#primaryimage","url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/11\/blog-post-ne-nov_Artboard-1-copy-63.jpg","contentUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/11\/blog-post-ne-nov_Artboard-1-copy-63.jpg","width":1921,"height":901,"caption":"threat intelligence sources"},{"@type":"BreadcrumbList","@id":"https:\/\/www.newevol.io\/resources\/blog\/best-threat-intelligence-for-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.newevol.io\/resources\/"},{"@type":"ListItem","position":2,"name":"Top Threat Intelligence Sources to Stay Ahead of Cyber Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.newevol.io\/resources\/#website","url":"https:\/\/www.newevol.io\/resources\/","name":"NewEvol","description":"Innovation in Motion","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.newevol.io\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680","name":"Krunal Medapara","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/image\/","url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg","contentUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg","caption":"Krunal Medapara"},"description":"Krunal Mendapara is the Chief Technology Officer, responsible for creating product roadmaps from conception to launch, driving the product vision, defining go-to-market strategy, and leading design discussions.","sameAs":["https:\/\/www.newevol.io\/","https:\/\/x.com\/krunalpatel17"],"url":"https:\/\/www.newevol.io\/resources\/author\/krunal-medapara\/"}]}},"_links":{"self":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/2255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/comments?post=2255"}],"version-history":[{"count":1,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/2255\/revisions"}],"predecessor-version":[{"id":2257,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/2255\/revisions\/2257"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/media\/2256"}],"wp:attachment":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/media?parent=2255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/categories?post=2255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/tags?post=2255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}