This website uses cookies to ensure you get the best experience on our website.
Please note that by continuing to use this site you consent to the terms of our Privacy and Data Protection Policy .
Some of our partner services are located in the United States. According to the case law of the European Court of Justice, there is currently no adequate data protection in the USA. There is a risk that your data will be controlled and monitored by US authorities. You cannot bring any effective legal remedies against this.
Accept

Proactive Cyber Defense and AI Training
with Reliable Threat Intelligence

Boost your AI-driven cybersecurity solutions with AV-Comparatives’ high-quality, curated threat intelligence feeds. Our reliable datasets provide the foundation you need to stay ahead of emerging cyber threats and enhance your defense strategies.

Threat Intelligence Feeds

Our comprehensive datasets—including clean files, Android application packages (APKs), potentially unwanted applications (PUAs), and unfiltered mixed files (Junk)—empower security professionals to fine-tune security tools, train machine learning models, conduct threat analyses, validate detection capabilities, and more.

Clean Feed

A reliable source of daily-fresh clean files which directly contribute to product improvement. This high-quality feed serves as a trusted baseline for training machine learning algorithms, helping to reduce false positives.

PUA Feed

A curated feed of potentially unwanted applications focused on Windows programs that may exhibit unwanted behaviors, such as intrusive ads or privacy concerns. This feed enables cybersecurity solutions to effectively detect these types of files.

APK Feed

A comprehensive, regularly updated collection of diverse Android application packages (APKs), specifically designed to help cybersecurity vendors enhance their detection models in the Android ecosystem by utilizing this exclusive data.

Junk Feed

An unfiltered dataset of mixed file types, including malware, corrupted files, clean files, and unidentified binaries. Designed for research and analysis, this feed provides raw, unprocessed data without categorization, reputation scoring, or context.

“The AV-Comparatives clean feed offers a great balance of volume and quality. Its accuracy and reliability make it one of the most valuable clean feeds available. It significantly enhances our ability to fine-tune our products.”

eset

“We highly recommend AV-Comparatives’ clean feed to any security vendor looking for a trustworthy, high-quality dataset. Its precision and reliability make a real difference in improving detection accuracy.”

“AV-Comparatives’ clean feed is an indispensable tool for security vendors. The high accuracy and well-curated selection greatly supported our work in improving malware detection while minimizing false positives.”

“Unlike other clean feeds, AV-Comparatives provides a consistently high-quality dataset with zero pollution. Their feed has proven to be an essential asset in refining our security solutions.”

A leading enpoint security provider

“AV-Comparatives’ clean feed stands out for its exceptional quality. Every file we’ve received has been truly clean, providing us with a reliable and trustworthy dataset.”

A cybersecurity-focused research group

“AV-Comparatives’ clean feed is an indispensable tool for security vendors. The high accuracy and well-curated selection make it far superior to many other alternatives. It has greatly supported our work in improving malware detection while minimizing false positives.”

An emerging IT company
leveraging clean data for AI/ML model training

Ready to get your product tested?

If you plan to have your product tested by us, feel free to reach out. We also provide further specialized testing upon request.

Beyond Traditional Cybersecurity Testing

Our technical cybersecurity audits combine deep product analysis with offensive security testing, uncovering weaknesses and limitations that impact the long-term success of your product. AV-Comparatives’ reports provide clear, actionable intelligence to help cybersecurity vendors demonstrate the effectiveness of their solutions.

Skip to content