Every article is enriched with threat actors, malware, CVEs, TTPs, IOCs, and more. No manual tagging required.
Extraction
Our AI models extract these entity types from every article:
State-sponsored threat actors
APT29, Lazarus Group, Volt Typhoon, Scattered Spider, APT28
Ransomware-as-a-service operators
LockBit, BlackCat, Cl0p, Play, Akira, 8Base, Medusa
Named threat operations
Operation Triangulation, SolarWinds, Log4Shell exploitation
Malicious software strains
Cobalt Strike, AsyncRAT, Emotet, QakBot, IcedID
Offensive security tools
Mimikatz, Metasploit, Impacket, BloodHound, PowerSploit
Attack methodologies
Phishing, DDoS, Supply Chain, Zero-Day, BEC
Common Vulnerabilities and Exposures
Extracted with severity scores and exploitation status when available
Tactics, Techniques, and Procedures
T1566 Phishing, T1059 Command Execution, T1486 Data Encrypted for Impact
C2 servers, malicious IPs
Malicious domains, phishing
MD5, SHA1, SHA256
Malicious endpoints
Targeted organizations
Healthcare, Finance, Gov
Geographic targeting
Windows, Linux, Cloud
How It Works
Fine-tuned models analyze article content, understanding context and relationships between entities.
Extracted entities are validated against known databases (MITRE, NVD, threat actor databases).
Entities are linked across articles, building a knowledge graph of threat relationships.
Use Cases
Browse threat actors, malware families, CVEs, and IOCs extracted from thousands of threat intelligence articles.