Threat Names
/api/threat/names
Retrieve all named threats, threat groups, threat actors, and malware families
Only available to advanced individual or enterprise users
Usage
API Key
API Keys are authenticated using the "Authorization: BEARER <YOUR_API_KEY>" scheme. Add this to your HTTP headers when making a request.
Response
200 OK
Input all required parameters, populate your API Key, and then click Run Query to try an API call and see the response here.