Help & Navigation

Search for any feature, page, or topic.

Pages

15

Intelligence Feed

/intelligence

All threat intelligence with search, filters by severity/category/industry, and live updates. Full feed with advanced filtering.

Daily Briefing

/briefing

Executive threat summary with 24h and 3-day windows. Critical threats, zero-days, ransomware, category breakdown, active actors. Export to PDF.

Timeline

/timeline

Chronological view of all threats grouped by date. Filter by severity. See attack progression over time.

Zero-Day Tracker

/zero-days

Dedicated tracker for actively exploited zero-day vulnerabilities. Shows affected products, CVEs, and recent activity.

Ransomware Tracker

/ransomware

Active ransomware group profiles, campaign tracking, targeted industries, and most active group leaderboard.

Firewalls & Network Edge

/firewalls

Vulnerabilities across Fortinet, Palo Alto, Cisco, SonicWall, Ivanti, Juniper, Check Point, and more.

Windows Security

/windows

Microsoft and Windows vulnerabilities, Patch Tuesday, Active Directory, Exchange, Hyper-V threats.

CVE Search

/cve

Search all tracked CVEs. Click any CVE ID for full detail with live CVSS scores, exploitation status, and analysis links.

CVE Detail

/cve/CVE-2026-0015

Full CVE enrichment page with live NVD data: CVSS score, attack vector, complexity, CWE weakness, references, exploit status, and links to NVD/MITRE/Exploit-DB/Shodan.

Threat Actors

/threat-actors

Profiles of 16+ tracked threat groups with MITRE ATT&CK tactic grids, TTPs, related articles, origin, and activity timeline.

Trends & Analytics

/trends

Week-over-week threat trends. Daily volume chart, category shifts, most active actors, top industries, source breakdown.

Industries

/industry

Threat intelligence filtered by industry: Healthcare, Finance, Government, Energy, Technology, Defense, and more.

Watchlist

/watchlist

Add products, threat actors, or CVEs you care about. Matching articles appear automatically. Stored locally.

Saved Articles

/saved

Articles you've bookmarked. Click Save on any article to add it here. Stored in your browser.

Admin Panel

/admin

Manage articles, run feed ingestion from 10+ sources, AI-classify raw threat intel with Claude, create articles manually.

Features

12

Live Threat Ticker

Scrolling banner below the navbar showing the latest threats in real-time. Pauses on hover. Click any item to read the full article.

Browser Notifications

Click the bell icon in the navbar to enable desktop alerts. You'll get a notification when a new Critical or Zero-Day is published.

Global Search (⌘K)

Press ⌘K (or Ctrl+K) anywhere to search articles, CVEs, and threat actors. Also shows quick navigation to all pages.

Save Articles

Click 'Save' on any article detail page to bookmark it. View all saved articles at /saved. Stored in your browser.

Watchlist Monitoring

Monitor specific products (FortiGate, PAN-OS), threat actors (APT29, LockBit), or CVEs. Matching articles appear automatically.

PDF Export

On the Daily Briefing page, click 'Export PDF' to generate a print-friendly version for leadership or board meetings.

Source Links

Every article card has a ↗ icon to go directly to the original advisory. Article pages have a prominent 'Read Full Advisory' button.

IOC Panel

Article detail pages auto-extract indicators of compromise (hashes, IPs, domains, CVEs) with links to VirusTotal, AnyRun, Shodan, and more.

MITRE ATT&CK Grid

Threat actor pages show a visual 14-tactic kill chain grid. Highlighted cells show observed capabilities from Reconnaissance to Impact.

Slack Alerts

Set SLACK_WEBHOOK_URL env var to push critical/zero-day threats to your Slack channel automatically on every ingest.

Daily Email Digest

Subscribe via the newsletter form. Receive a daily email briefing with top threats, grouped by severity, from verified sources.

Theme Toggle

Switch between dark mode, light mode, or system theme. Click the sun/moon icons in the navbar.

Keyboard Shortcuts

2
K

⌘K / Ctrl+K

Open global search and command palette from anywhere.

Esc

Escape

Close the search dialog.

Data Sources

1

Data Sources

Security Intel Hub ingests from: CISA KEV, NIST NVD, BleepingComputer, The Hacker News, Krebs on Security, Dark Reading, SecurityWeek, CyberScoop, The Record, Threatpost. Updated every 5 minutes.

Threat Levels

4
CRITICAL

CRITICAL

Active exploitation of critical infrastructure, CVSS 9.0+, mass exploitation, emergency directive issued.

HIGH

HIGH

Active exploitation confirmed, CVSS 7.0–8.9, targeted campaigns with significant impact.

MEDIUM

MEDIUM

Known vulnerability without widespread exploitation, emerging threats, moderate risk.

LOW

LOW

Informational, guidance, law enforcement actions, low-impact advisories.

Contact Us

Have a question, feedback, or partnership inquiry? Send us a message and we'll get back to you.

0/5000