Skip to main content
Mallory

Breaking News

New and updated threat intelligence stories from the last 48 hours, tracked and analyzed by Mallory.

New

Vercel Confirms Breach After Threat Actor Offers Alleged Stolen Data for Sale

12
Vercel Confirms Breach After Threat Actor Offers Alleged Stolen Data for Sale

Vercel confirmed a security incident involving unauthorized access to certain internal systems after a threat actor using the name **ShinyHunters** claimed to be selling allegedly stolen company data on a hacking forum. The company said only a limited subset of customers was affected, its services remain operational, and it has engaged incident response experts, notified law enforcement, and is working directly with impacted customers. The actor claimed the stolen data included access keys, source code, database data, internal deployment access, and API keys, and shared a text file with 580 employee-related records along with a screenshot purportedly showing an internal Vercel Enterprise dashboard. Vercel advised customers to review environment variables and rotate secrets if necessary, while the authenticity of the leaked materials and the attribution to **ShinyHunters** remained unverified; the actor also claimed on Telegram that a **$2 million** ransom demand had been discussed with the company.

Created: Apr 19, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 20, 2026Vercel links breach to compromised OAuth app and Context.ai account access
  • Apr 19, 2026Vercel confirms security incident affecting internal systems

RCE in Sagredo qmail Fork via MX Hostname Shell Injection

7
RCE in Sagredo qmail Fork via MX Hostname Shell Injection

A high-severity vulnerability tracked as **CVE-2026-41113** allows remote code execution in the `sagredo-dev/qmail` fork by injecting shell metacharacters into MX hostnames processed by `qmail-remote`. The flaw is in the `tls_quit()` path, where the `notlshosts_auto` feature added in 2024 builds a shell command from attacker-controlled DNS data and executes it with `popen()`. If a target server sends mail to a domain whose DNS is controlled by an attacker, a malicious MX record can trigger command execution as the `qmailr` user when `control/notlshosts_auto` is enabled. The issue affects `sagredo-dev/qmail` versions **v2024.10.26 through v2026.04.02** and was fixed in **v2026.04.07** in commit `749f607`. Public disclosures describe proof-of-concept exploitation using crafted MX values such as `x'\`id>/tmp/pwned\`'y.evil.com`, and the flaw has been assigned a **CVSS 3.1 score of 8.2**. Advisories and follow-on reporting say technical details and exploit code were published alongside the disclosure, increasing the urgency for operators of the Sagredo fork to upgrade immediately.

Created: Apr 18, 2026Updated: Apr 19, 2026
Latest Timeline Events
  • Apr 7, 2026Public disclosure and PoC details published for CVE-2026-41113
  • Apr 7, 2026Fix released for CVE-2026-41113 in qmail v2026.04.07

OVN heap over-read flaws leak memory via DHCPv6 and ICMP responses

4
OVN heap over-read flaws leak memory via DHCPv6 and ICMP responses

Red Hat disclosed two **heap over-read** vulnerabilities in **OVN (Open Virtual Network)** that can leak memory from `ovn-controller` back to attacker-controlled workloads. **`CVE-2026-5367`** affects DHCPv6 Client ID processing: when the userspace `pinctrl` thread builds a DHCPv6 ADVERTISE reply, it echoes a Client ID option using an attacker-supplied length field without checking packet bounds. A malicious workload can send a crafted DHCPv6 SOLICIT packet with an inflated Client ID length and cause heap data beyond the valid packet buffer to be copied into the reply and returned to the VM port, particularly in deployments where DHCPv6 options are configured on Logical Switch Ports. A second flaw, **`CVE-2026-5265`**, affects ICMP error generation in the same component. OVN copies packet data into ICMP Destination Unreachable or Packet Too Big responses based on self-declared IPv4 or IPv6 length fields without validating them against the actual buffer size, allowing a malicious VM to send truncated packets with inflated length values and receive adjacent heap memory in the ICMP reply. The issue can be triggered through reject ACLs, Gateway MTU checks, or reject-configured load balancers. Users were advised to apply patches or upgrade to fixed releases including **`v24.03.8`**, **`v25.03.3`**, **`v25.09.3`**, and **`v26.03.1`**; for `CVE-2026-5367`, **`v24.09.4`** is also listed as fixed, while Red Hat noted the previously referenced `24.09` release for `CVE-2026-5265` will not occur.

Created: Apr 20, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 20, 2026Red Hat discloses CVE-2026-5265 OVN ICMP response heap over-read
  • Apr 20, 2026Red Hat discloses CVE-2026-5367 OVN DHCPv6 heap over-read

Critical RCE and Default Password Flaws Disclosed in Silex SD-330AC and AMC Manager

4
Critical RCE and Default Password Flaws Disclosed in Silex SD-330AC and AMC Manager

Silex Technology's **SD-330AC** and **AMC Manager** were disclosed with two serious vulnerabilities that expose devices to remote compromise and unauthorized reconfiguration. The most severe issue, `CVE-2026-32956`, is a **heap-based buffer overflow** in redirect URL processing that can enable **arbitrary code execution** over the network without authentication or user interaction. The flaw is tracked as `CWE-122` and carries a critical `CVSS v3.1` vector of `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`, indicating full compromise of confidentiality, integrity, and availability is possible. A second flaw, `CVE-2026-32965`, affects devices left in their **factory-default state** and allows them to be configured with a **null string password**, creating an insecure initialization condition. Classified as `CWE-1188`, the vulnerability is network-accessible and primarily threatens device integrity, with a `CVSS v3.1` vector of `AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`. The issues were reported through **JPCERT/CC** and published via **JVN** and Silex security advisories in Japanese and English, putting administrators on notice to review exposed deployments and initialization practices.

Created: Apr 20, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 20, 2026CVE-2026-32959 recorded for Silex SD-330AC and AMC Manager
  • Apr 20, 2026JVN and Silex advisories publish details for the two vulnerabilities

North Korean Hackers Blamed for $290 Million Kelp DAO Crypto Theft

3
North Korean Hackers Blamed for $290 Million Kelp DAO Crypto Theft

More than **$290 million** in cryptocurrency was stolen from **Kelp DAO** after attackers compromised infrastructure used to verify cross-chain messages and exploited the platform’s `rsETH` configuration. According to LayerZero, the intruders abused Kelp’s single-verifier setup rather than a redundant multi-verifier model, allowing them to mint unbacked `rsETH` and use it as collateral to borrow real **Ether** and stablecoins from other platforms, including **Aave**. LayerZero said preliminary indicators point to North Korea’s **TraderTraitor** group, which is linked to the broader **Lazarus** operation. Kelp DAO disputed LayerZero’s account and argued that LayerZero’s own servers were compromised, setting up a public dispute over responsibility for one of the largest crypto thefts reported this year. LayerZero’s post-mortem said the attackers also used **DDoS** activity against backup systems and self-destructing tools to hinder detection and complete the theft. Law enforcement has been notified, Aave is evaluating remediation, and the incident adds to a long-running pattern of DPRK-linked cryptocurrency thefts that investigators say have generated billions of dollars over the past several years.

Created: Apr 20, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 20, 2026LayerZero ends support for single-verifier message signing
  • Apr 20, 2026Law enforcement and Aave begin response to Kelp theft

Progress LoadMaster API Flaws Enable Authenticated OS Command Injection

2
Progress LoadMaster API Flaws Enable Authenticated OS Command Injection

Progress disclosed two high-severity OS command injection vulnerabilities in its ADC product line, including **LoadMaster**, **ECS Connection Manager**, **Object Scale Connection Manager**, and **MOVEit WAF**. The issues, tracked as `CVE-2026-3517` and `CVE-2026-3519`, affect the API and can lead to remote code execution when authenticated administrators submit unsanitized input to specific commands. Both flaws are classified as `CWE-77` and carry a `CVSS v3.1` vector of `AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`, indicating high impact across confidentiality, integrity, and availability. `CVE-2026-3517` allows an attacker with **Geo Administration** permissions to exploit the `addcountry` command, while `CVE-2026-3519` requires **VS Administration** permissions to abuse the `aclcontrol` command. In both cases, Progress said arbitrary commands could be executed through the vulnerable API, and the vendor published an advisory covering these and related CVEs. Organizations using affected appliances should prioritize reviewing administrative access and applying vendor guidance to reduce exposure to authenticated abuse paths.

Created: Apr 20, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 20, 2026Progress publishes advisory for CVE-2026-3519 and related CVEs
  • Apr 20, 2026Progress receives reports for CVE-2026-3517 and CVE-2026-3519

Microsoft Reverts Teams Update After Desktop Client Launch Failures

2
Microsoft Reverts Teams Update After Desktop Client Launch Failures

Microsoft reverted a service update after it caused some **Microsoft Teams desktop client** users to become stuck on the loading screen with the error, “We’re having trouble loading your message. Try refreshing.” The company tracked the disruption as incident `TM1283300`, initially describing it as a transient service infrastructure issue before identifying the root cause as a regression in the Teams client build-caching system that pushed some older desktop builds into an unhealthy state. Microsoft said the impact appears limited to the **desktop client**, with no indication that web or mobile users were affected. The company reported that its automated recovery system helped remediate the issue, then fully rolled back the problematic update and monitored telemetry and customer feedback to confirm recovery. Impacted users were instructed to fully quit and restart Teams so the reverted configuration could propagate, though Microsoft did not disclose how many customers or regions were affected.

Created: Apr 20, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 20, 2026Microsoft reverts problematic Teams update and issues restart guidance
  • Apr 20, 2026Microsoft identifies issue and begins automated remediation

Remote Buffer Overflows Disclosed in H3C Magic B1 `/goform/aspForm` Functions

2
Remote Buffer Overflows Disclosed in H3C Magic B1 `/goform/aspForm` Functions

Two high-severity vulnerabilities, **`CVE-2026-6563`** and **`CVE-2026-6581`**, were disclosed in **H3C Magic B1** devices running versions up to **`100R004`**, exposing the products to remotely exploitable buffer overflows. Both flaws reside in the **`/goform/aspForm`** component and are triggered by crafted manipulation of the **`param`** argument, with `CVE-2026-6563` affecting the **`SetAPWifiorLedInfoById`** function and `CVE-2026-6581` affecting **`SetMobileAPInfoById`**.

Created: Apr 19, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 19, 2026CVE-2026-6563 disclosed for H3C Magic B1 buffer overflow
  • Apr 19, 2026CVE-2026-6581 disclosed for H3C Magic B1 buffer overflow

Updated

TeamPCP Supply Chain Breaches Expand Into Ransomware-Linked OSS Campaign

35
TeamPCP Supply Chain Breaches Expand Into Ransomware-Linked OSS Campaign

TeamPCP has expanded a multi-ecosystem software supply chain campaign that compromised open-source security and developer tools including **Trivy**, **Checkmarx KICS**, **LiteLLM**, **Telnyx**, GitHub Actions, OpenVSX extensions, Docker images, and packages published through **PyPI** and **npm**. Reporting indicates the attackers used stolen developer and publishing credentials to push malicious releases through trusted channels, harvest environment variables, shell histories, cloud credentials, and GitHub tokens, and move laterally across CI/CD environments. In the Telnyx incident, valid credentials were reportedly used to publish malicious PyPI releases, with a second-stage payload hidden in a WAV file and code triggered on import. The campaign is now being linked to follow-on ransomware activity through an alleged partnership between TeamPCP and the **Vect** ransomware group, which has been advertised on BreachForums as an emerging ransomware-as-a-service operation. Researchers say the supply chain compromises may serve as initial access for extortion campaigns against downstream organizations, with TeamPCP reportedly recruiting negotiators after the Trivy breach and previously exfiltrating roughly **300 GB** of compressed credentials; the LiteLLM compromise alone was tied to hundreds of thousands of stolen credentials. The incidents underscore how compromised open-source tooling and CI/CD infrastructure can give attackers privileged enterprise access and create a path from package poisoning to ransomware deployment.

Created: Mar 26, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 15, 2026Vect leak site publishes first victim from TeamPCP-linked extortion campaign
  • Apr 8, 2026CISA KEV deadline for CVE-2026-33634 passes without standalone TeamPCP advisory

North Korea-Linked Threat Activity and Reporting on Lazarus, IT Worker Schemes, and Related Malware

17
North Korea-Linked Threat Activity and Reporting on Lazarus, IT Worker Schemes, and Related Malware

Multiple reports and threat-intel posts highlighted **North Korea-linked cyber activity** spanning social engineering, malware, and broader ecosystem analysis. AllSecure described an attempted compromise of a CEO via a **fake LinkedIn job interview** attributed to **Lazarus** tradecraft (tagged *BeaverTail* / *Contagious Interview*), indicating continued use of recruiter-style lures and developer tooling themes (e.g., *VSCode*) to gain execution on target systems. Separately, eSentire published technical analysis on the **DEV#POPPER remote access trojan** and associated **OmniStealer** activity, framing it as DPRK-linked malware and providing defensive guidance for organizations facing this threat class. Additional DPRK-focused intelligence covered both strategic and operational dimensions. Google’s *Cloud Threat Horizons Report H1 2026* discussed cloud-focused threat activity and tracked DPRK-linked clusters (including **UNC4899** and **UNC5267**), while Logpresso published an OSINT report on **DPRK remote IT worker** infiltration tactics (fraudulent employment/contractor placement). NKInternet released a catalog-style overview of **North Korea’s software export ecosystem**, and RedAsgard’s “Hunting Lazarus” series contributed hands-on investigative detail into Lazarus operator artifacts. A separate Lazarus threat-actor profile page aggregated historical reporting and statistics, but did not add a discrete new incident beyond compilation.

Created: Mar 11, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 20, 2026FalconFeeds reports UNC1069 deepfake campaign targeting crypto and supply chains
  • Apr 17, 2026Researcher claims DPRK-linked IT worker cell infiltrated Tokamak Network

Iran-Linked Hybrid Threats to Middle East Digital and Maritime Infrastructure

16
Iran-Linked Hybrid Threats to Middle East Digital and Maritime Infrastructure

Escalation in the **Iran-US-Israel conflict** is disrupting regional digital and communications infrastructure through both direct threats and indirect operational impacts. Iran-linked activity has reportedly expanded from military retaliation rhetoric to threats against major U.S. technology companies' facilities in the Middle East, including sites associated with **Microsoft, Amazon, Google, Oracle, IBM, and Nvidia**, while earlier attacks were said to have caused outages at **AWS** datacenters in the UAE and Bahrain. In parallel, maritime traffic near the **Strait of Hormuz** has experienced anomalies consistent with **GNSS spoofing** and other electronic warfare techniques, with vessels reporting false positions and receiving radio warnings that could be used to shape shipping behavior without a formal blockade. The same regional instability is also affecting subsea connectivity projects. Meta's **2Africa** cable build has been delayed after **Alcatel Submarine Networks** declared force majeure and said it could no longer safely operate in the Persian Gulf, leaving the *Pearls* segment incomplete despite most cable having already been laid. Together, the reporting indicates a broader pattern in which conflict around Iran is creating cyber-physical risk across **cloud infrastructure, maritime navigation, and undersea communications**, increasing the likelihood of service disruption, delayed repairs, higher operating costs, and reduced confidence in critical regional infrastructure.

Created: Mar 13, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 19, 2026Reported U.S. interdiction expands to Gulf of Oman near Chabahar
  • Apr 18, 2026Reported attack on SANMAR HERALD triggers renewed Hormuz reversals

Regulatory Investigations Into X’s Grok Over Non-Consensual Sexual Image Generation

12
Regulatory Investigations Into X’s Grok Over Non-Consensual Sexual Image Generation

Ireland’s **Data Protection Commission (DPC)** opened a formal GDPR investigation into X’s use of the **Grok** AI tool after reports that users could prompt `@Grok` to generate non-consensual sexualized images of real people, including children. The DPC said it will examine whether X’s EU subsidiary (**X Internet Unlimited Company**) met core GDPR obligations, including lawful processing, *data protection by design*, and whether appropriate **data protection impact assessments** were conducted. The Irish inquiry adds to a widening set of actions focused on Grok-related harms and platform safety governance. UK authorities have also moved to tighten expectations for AI chatbot providers following Grok-linked sharing of non-consensual intimate images, with the UK government signaling faster rule updates and enforcement for child-safety duties; separately, the UK **ICO** has opened its own investigation, and the European Commission has initiated proceedings under the **Digital Services Act** to assess whether X adequately evaluated risks before deploying Grok. Additional reported scrutiny includes investigations by California’s Attorney General and UK regulator **Ofcom**, and a separate criminal probe in France involving a raid of X’s Paris offices.

Created: Feb 17, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Feb 17, 2026European Commission examines X under the Digital Services Act
  • Feb 17, 2026Ireland's DPC opens formal GDPR probe into X over Grok images

Pentagon–Anthropic Dispute Over Military AI Use and Provider Baselines

12
Pentagon–Anthropic Dispute Over Military AI Use and Provider Baselines

The U.S. Department of Defense has escalated a dispute with **Anthropic** over the conditions under which its AI models could be used by the military, after Anthropic reportedly insisted on limits including *no mass surveillance of Americans* and *no fully autonomous weapons*. Reporting cited in both accounts indicates Pentagon officials have discussed potentially designating Anthropic a **“supply chain risk”**—a step that could bar the company from government work and pressure defense contractors to sever ties—while at least one senior official was quoted as saying the department would “make sure they pay a price” for non-cooperation. At the same time, the Pentagon is engaging **Anthropic, OpenAI, Google, and xAI** to align all major U.S. AI providers on a common “baseline” of expectations, after contracts were signed with limited specificity and the department now wants to deploy models into DoD environments to enable broader development of AI agents with minimal human oversight. The coverage also describes the policy vacuum driving the standoff: key rules for military AI use are being shaped through ad hoc negotiations between the Pentagon and private AI firms, prompting calls for **Congress** to set durable, democratically accountable constraints rather than leaving governance to bilateral bargaining.

Created: Feb 21, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 19, 2026Axios reports NSA actively using Anthropic Mythos despite blacklist
  • Apr 10, 2026Courts let Anthropic blacklist stand but narrow parts of its application

Scattered Spider Member Pleads Guilty in $8 Million SMS Phishing and Crypto Theft Scheme

12
Scattered Spider Member Pleads Guilty in $8 Million SMS Phishing and Crypto Theft Scheme

Tyler Robert Buchanan, a 24-year-old British national from Dundee, Scotland, pleaded guilty in U.S. federal court in California to **conspiracy to commit wire fraud** and **aggravated identity theft** for his role in Scattered Spider’s large-scale social-engineering operation. Prosecutors said Buchanan and co-conspirators ran SMS phishing campaigns from September 2021 to April 2023 that impersonated corporate IT help desks and labor providers, used fake login pages and stolen credentials, and carried out SIM swapping to breach companies and individuals. The Justice Department said the scheme stole at least **$8 million in virtual currency** from U.S. victims across telecommunications, technology, cloud communications, outsourcing, gaming, and cryptocurrency sectors. Investigators tied Buchanan to the 2022 **0ktapus** campaign, which used fake Okta login pages to compromise more than 130 organizations, including **Twilio** and **Cloudflare**, and enabled downstream attacks affecting other major brands. Authorities said stolen credentials were funneled into a Telegram channel administered by Buchanan and an associate, and searches of his residence in Scotland uncovered victim company files, personal data, and roughly 20 devices. Buchanan was arrested in Palma de Mallorca by Spanish authorities, extradited to the United States, and has been in federal custody since April 2025; he now faces up to 22 years in prison, underscoring continued law-enforcement pressure on the loosely organized Scattered Spider group, an offshoot of **The Com**.

Created: Apr 18, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 17, 2026DOJ announces guilty plea and August sentencing date
  • Apr 17, 2026Buchanan pleads guilty in U.S. federal court

Multiple Vulnerabilities Disclosed in OpenClaw

11
Multiple Vulnerabilities Disclosed in OpenClaw

dCERT published advisories **2026-0836** and **2026-0866** covering **multiple vulnerabilities in OpenClaw**, indicating that the product is affected by more than one security flaw and that the issue set warranted repeated or updated notification. The advisories identify OpenClaw as the impacted technology but do not provide a public synopsis in the referenced notices. Organizations using **OpenClaw** should review both dCERT advisories to determine affected versions, vulnerability details, and available mitigations or patches. The paired notices suggest ongoing vulnerability handling around the product, making prompt validation of exposure, patch status, and any vendor remediation guidance a priority.

Created: Mar 25, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 20, 2026dCERT publishes OpenClaw security bypass advisory 2026-1155
  • Apr 17, 2026dCERT publishes OpenClaw vulnerabilities advisory 2026-1139

European Push for Digital Sovereignty in Cloud Infrastructure

11
European Push for Digital Sovereignty in Cloud Infrastructure

European governments and organizations are intensifying efforts to achieve digital sovereignty in cloud infrastructure, driven by geopolitical uncertainties and concerns over reliance on American hyperscalers such as Microsoft, Google, and Amazon Web Services. With U.S. policy shifts and potential transatlantic tensions, European leaders are prioritizing the development of domestic alternatives and strategies to ensure control over sensitive data and critical workloads. Despite these ambitions, local cloud providers currently hold only a small share of the market, and experts suggest that a new European hyperscaler is unlikely to emerge soon, with existing players like SAP and Deutsche Telekom each controlling only about 2% of the market. In response to these sovereignty concerns, cloud providers are expanding offerings tailored to regulatory and data residency requirements. Amazon Web Services, for example, has introduced Dedicated Local Zones to provide customers with greater control over data location, security, and compliance, supporting sensitive workloads for public sector and regulated industries. These initiatives reflect a broader trend of cloud service adaptation to meet the evolving needs of European customers seeking to balance operational flexibility with strict sovereignty and compliance mandates.

Created: Dec 12, 2025Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 17, 2026European Commission awards €180M sovereign cloud contract to four providers
  • Apr 16, 2026Four European firms launch sovereign disaster recovery package

Active Exploitation of Flowise CustomMCP RCE Exposes Thousands of Internet-Facing Instances

10
Active Exploitation of Flowise CustomMCP RCE Exposes Thousands of Internet-Facing Instances

Threat actors are actively exploiting **CVE-2025-59528**, a **CVSS 10.0** remote code execution flaw in the open-source AI platform **Flowise**. The bug affects Flowise versions through **3.0.5** and stems from the `CustomMCP` node unsafely passing user-controlled input into JavaScript execution, allowing attackers with an API token to run arbitrary code with full **Node.js** runtime privileges. Researchers said the issue can be triggered remotely via a crafted HTTP `POST` request without user interaction, leading to operating system command execution, filesystem access, sensitive data theft, and full system compromise. Security researchers observed in-the-wild exploitation originating from a single **Starlink IP address**, while warning that roughly **12,000 to 15,000** internet-exposed Flowise instances sharply expand the attack surface for opportunistic attacks. Flowise disclosed the vulnerability in 2025, credited researcher **Kim SooHyun**, and patched the flaw in **version 3.0.6**. The incident marks the third Flowise vulnerability reported as exploited in the wild after **CVE-2025-8943** and **CVE-2025-26319**, increasing pressure on organizations to upgrade immediately and limit public exposure of Flowise APIs.

Created: Apr 7, 2026Updated: Apr 20, 2026
Latest Timeline Events
  • Apr 20, 2026OX Security discloses broader MCP design flaw impacting Flowise and AI tools
  • Apr 8, 2026VulnCheck flags two more Flowise flaws under active exploitation
+ 37 more updated

Want to go back further? Create an account to access the full archive, custom alerts, and deeper analysis.

Prefer RSS? Grab any topic — or the full firehose — from the feeds page

Want More Intelligence?

Get real-time threat intelligence, vulnerability alerts, and actionable insights delivered to your team before threats become incidents.

Full platform access
Slack channel with the team
Feature requests and early previews
Early-adopter pricing