diff --git a/README.md b/README.md index a6a85809c..f6c4db47e 100644 --- a/README.md +++ b/README.md @@ -98,6 +98,7 @@ If you find a false positive or would like to propose a new detection rule idea * [AttackRuleMap - Mapping of Atomic Red Team tests and Sigma Rules](https://attackrulemap.com/) * [Confluent Sigma](https://github.com/confluentinc/confluent-sigma) - Kafka Streams supported Sigma rules * [Detection Studio](https://detection.studio/?ref=sigmahq_readme) - Convert Sigma rules to any supported SIEM. +* [Exeon.UEBA](https://exeon.com/ueba/) - User and Entity Behavior Analytics (UEBA) solution from Exeon which provides a built-in Sigma detection engine. * [IBM QRadar](https://community.ibm.com/community/user/security/blogs/gladys-koskas1/2023/08/02/qradar-natively-supports-sigma-for-rules-creation) * [Impede Detection Platform](https://impede.ai/) * [Joe Sandbox](https://www.joesecurity.org/blog/8225577975210857708)