Glossary  /  The basics

Glossary

What is threat clustering?

Threat clustering is the process of grouping every article, advisory and source about the same incident into a single record. One read instead of thirty.

The same Cisco zero-day shows up across The Register, BleepingComputer, vendor advisories, Reddit, and LinkedIn within an hour of breaking. An analyst skimming feeds reads each one before realising they cover the same story. A clusterer does that grouping automatically, so the analyst reads one consolidated record — with every detail the eleven sources contributed, and every IOC extracted once.

How it works under the hood

Most modern clusterers use a combination of:

Why it changes an analyst's day

Without clustering, the job becomes collection: reading the same story across ten outlets, mentally deduplicating, copying details into a spreadsheet. That's labour, not analysis.

With clustering, the analyst opens a pre-structured record with the sources already grouped, the entities already extracted, and the threat score already calculated. The work shifts to triage, assessment, and response — the parts the analyst actually trained for.

The volume case. ThreatCluster typically groups around 13 source articles into each cluster. That means around 900 daily articles collapse to roughly 70 clusters — a ~92% reduction before any personalised filtering is applied.

What a good cluster contains

See how ThreatCluster does it for the full breakdown.

See it in the live feed.

Concepts on this page show up in the platform every day. Sign up free to see them in action.