Help & Navigation
Search for any feature, page, or topic.
Pages
15Intelligence Feed
/intelligenceAll threat intelligence with search, filters by severity/category/industry, and live updates. Full feed with advanced filtering.
Daily Briefing
/briefingExecutive threat summary with 24h and 3-day windows. Critical threats, zero-days, ransomware, category breakdown, active actors. Export to PDF.
Timeline
/timelineChronological view of all threats grouped by date. Filter by severity. See attack progression over time.
Zero-Day Tracker
/zero-daysDedicated tracker for actively exploited zero-day vulnerabilities. Shows affected products, CVEs, and recent activity.
Ransomware Tracker
/ransomwareActive ransomware group profiles, campaign tracking, targeted industries, and most active group leaderboard.
Firewalls & Network Edge
/firewallsVulnerabilities across Fortinet, Palo Alto, Cisco, SonicWall, Ivanti, Juniper, Check Point, and more.
Windows Security
/windowsMicrosoft and Windows vulnerabilities, Patch Tuesday, Active Directory, Exchange, Hyper-V threats.
CVE Search
/cveSearch all tracked CVEs. Click any CVE ID for full detail with live CVSS scores, exploitation status, and analysis links.
CVE Detail
/cve/CVE-2026-0015Full CVE enrichment page with live NVD data: CVSS score, attack vector, complexity, CWE weakness, references, exploit status, and links to NVD/MITRE/Exploit-DB/Shodan.
Threat Actors
/threat-actorsProfiles of 16+ tracked threat groups with MITRE ATT&CK tactic grids, TTPs, related articles, origin, and activity timeline.
Trends & Analytics
/trendsWeek-over-week threat trends. Daily volume chart, category shifts, most active actors, top industries, source breakdown.
Industries
/industryThreat intelligence filtered by industry: Healthcare, Finance, Government, Energy, Technology, Defense, and more.
Watchlist
/watchlistAdd products, threat actors, or CVEs you care about. Matching articles appear automatically. Stored locally.
Saved Articles
/savedArticles you've bookmarked. Click Save on any article to add it here. Stored in your browser.
Admin Panel
/adminManage articles, run feed ingestion from 10+ sources, AI-classify raw threat intel with Claude, create articles manually.
Features
12Live Threat Ticker
Scrolling banner below the navbar showing the latest threats in real-time. Pauses on hover. Click any item to read the full article.
Browser Notifications
Click the bell icon in the navbar to enable desktop alerts. You'll get a notification when a new Critical or Zero-Day is published.
Global Search (⌘K)
Press ⌘K (or Ctrl+K) anywhere to search articles, CVEs, and threat actors. Also shows quick navigation to all pages.
Save Articles
Click 'Save' on any article detail page to bookmark it. View all saved articles at /saved. Stored in your browser.
Watchlist Monitoring
Monitor specific products (FortiGate, PAN-OS), threat actors (APT29, LockBit), or CVEs. Matching articles appear automatically.
PDF Export
On the Daily Briefing page, click 'Export PDF' to generate a print-friendly version for leadership or board meetings.
Source Links
Every article card has a ↗ icon to go directly to the original advisory. Article pages have a prominent 'Read Full Advisory' button.
IOC Panel
Article detail pages auto-extract indicators of compromise (hashes, IPs, domains, CVEs) with links to VirusTotal, AnyRun, Shodan, and more.
MITRE ATT&CK Grid
Threat actor pages show a visual 14-tactic kill chain grid. Highlighted cells show observed capabilities from Reconnaissance to Impact.
Slack Alerts
Set SLACK_WEBHOOK_URL env var to push critical/zero-day threats to your Slack channel automatically on every ingest.
Daily Email Digest
Subscribe via the newsletter form. Receive a daily email briefing with top threats, grouped by severity, from verified sources.
Theme Toggle
Switch between dark mode, light mode, or system theme. Click the sun/moon icons in the navbar.
Keyboard Shortcuts
2⌘K / Ctrl+K
Open global search and command palette from anywhere.
Escape
Close the search dialog.
Data Sources
1Data Sources
Security Intel Hub ingests from: CISA KEV, NIST NVD, BleepingComputer, The Hacker News, Krebs on Security, Dark Reading, SecurityWeek, CyberScoop, The Record, Threatpost. Updated every 5 minutes.
Threat Levels
4CRITICAL
Active exploitation of critical infrastructure, CVSS 9.0+, mass exploitation, emergency directive issued.
HIGH
Active exploitation confirmed, CVSS 7.0–8.9, targeted campaigns with significant impact.
MEDIUM
Known vulnerability without widespread exploitation, emerging threats, moderate risk.
LOW
Informational, guidance, law enforcement actions, low-impact advisories.
Contact Us
Have a question, feedback, or partnership inquiry? Send us a message and we'll get back to you.