Visualização normal

Antes de ontemStream principal
  • ✇Cyber Security News
  • Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations Cybernewswire
    Torrance, United States / California, May 1st, 2026, CyberNewswire Criminal IP partners with Securonix to integrate Criminal IP’s Threat Intelligence into ThreatQ, allowing organizations to incorporate external IP intelligence into their existing workflows, helping security teams accelerate analysis and response with more actionable context. Unlike traditional intelligence feeds, Criminal IP provides visibility into how assets and infrastructure are exposed across the internet. By embeddin
     

Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations

1 de Maio de 2026, 14:40

Torrance, United States / California, May 1st, 2026, CyberNewswire

Criminal IP partners with Securonix to integrate Criminal IP’s Threat Intelligence into ThreatQ, allowing organizations to incorporate external IP intelligence into their existing workflows, helping security teams accelerate analysis and response with more actionable context.

Unlike traditional intelligence feeds, Criminal IP provides visibility into how assets and infrastructure are exposed across the internet. By embedding this data into ThreatQ, organizations can incorporate real-world context into investigations without disrupting existing processes.

ThreatQ centralizes and prioritizes threat data from multiple sources. With Criminal IP integrated, organizations can enrich this data with continuously updated, exposure-based intelligence, strengthening investigation and response workflows without added complexity.

Automated Intelligence Enrichment at Scale

Within the integrated environment, Criminal IP’s threat intelligence APIs automatically enrich incoming IP indicators in ThreatQ with contextual data such as maliciousness scoring, VPN and proxy detection, remote access exposure, open ports, and known vulnerabilities.

Powered by ThreatQ’s data-driven orchestration engine, organizations can configure automated workflows that continuously evaluate incoming indicators against Criminal IP’s threat database.

This ensures that threat context remains current without requiring manual analyst effort, supporting faster triage and more consistent prioritization.

Real-Time Investigation Within a Unified Workspace

<caption: Criminal IP intelligence integrated into the ThreatQ dashboard, enabling unified visibility into enriched indicators and risk context>

The integration allows analysts to access Criminal IP intelligence directly within the ThreatQ interface, enabling real-time validation of suspicious IP activity without switching tools.

By combining exposure data with infrastructure-level insights, teams can assess risk more effectively within their existing workflows.

Analysts can also perform on-demand Criminal IP lookups directly from indicator detail views or investigation boards, providing immediate access to additional context during active investigations.

Criminal IP further enhances ThreatQ’s investigation graph by revealing relationships between IP addresses, associated infrastructure, and attack activity, helping analysts better understand connections and patterns across threats.

Intelligence-Driven Prioritization and Response

<caption: Criminal IP enrichment integrated within the ThreatQ Orchestrator, enabling automated ingestion and filtering of exposure-based IP intelligence directly into analysis workflows>

By integrating Criminal IP’s intelligence into ThreatQ’s scoring framework, organizations can align risk evaluation with their specific operational environment. This enables more precise prioritization and supports more effective decision-making during investigations.

Enriched data can also be visualized through dashboards, providing clearer visibility into maliciousness trends, VPN usage, and risk distribution across indicators.

Expanding Visibility with Exposure Intelligence

The integration highlights the growing importance of exposure-based intelligence in modern threat analysis. By continuously monitoring and analyzing internet-facing assets and IP infrastructure, Criminal IP provides differentiated visibility that extends beyond traditional indicator-based approaches.

“This integration enables organizations to bring IP reputation and exposure intelligence directly into the ThreatQ platform, supporting faster analysis and more effective response throughout the investigation lifecycle,” said Byungtak Kang, CEO of Criminal IP.

“By integrating our intelligence into existing workflows, security teams can improve visibility and make more informed decisions without adding operational complexity.”

“This collaboration strengthens the role of IP intelligence at critical points of investigation and decision-making,” said Scott Sampson, Chief Revenue Officer, Securonix.

“By combining ThreatQ’s orchestration and prioritization capabilities with Criminal IP’s real-time threat data, organizations can accelerate enrichment processes, reduce manual workloads, and focus on the most relevant threats within their environment.”

Through this partnership, Criminal IP and Securonix enable security teams to operationalize threat intelligence more effectively by integrating automated enrichment, workflow orchestration, and precise prioritization within the ThreatQ platform.

About Criminal IP

Criminal IP is a cyber threat intelligence solution operated by AI SPERA that provides decision-ready IP address and domain reputation data to security teams worldwide.

By continuously scanning the global internet, Criminal IP aggregates and contextualizes threat signals across IPs, domains, URLs, and attack infrastructure, covering malicious indicators, known vulnerabilities, exposed assets, and attacker behavior.

Criminal IP’s mission is to give organizations real visibility into their cyber landscape and accelerate threat detection and response by delivering the intelligence needed to outsmart attackers. For more information, users can visit www.criminalip.io.

About Securonix

Securonix is transforming security operations with the industry’s first Unified Defense SIEM with Agentic AI, built to decide and act across the threat lifecycle with a human-in-the-loop philosophy.

Its cloud-native platform unifies detection, investigation, and response, while enabling Sam, the AI SOC Analyst, and a productivity-based AI operating model for the SOC, so organizations can measure and govern AI by the analyst work it delivers.

Helping enterprises become Breach Ready and Board Ready, Securonix delivers accountable, outcome-driven security operations at scale.

Recognized as a Leader in the Gartner Magic Quadrant for SIEM and a Customers’ Choice by Gartner Peer Insights, Securonix delivers trusted security operations for global enterprises. Uses can learn more at www.securonix.com.

Contact

Michael Sena

Criminal IP

support@aispera.com

The post Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations appeared first on Cyber Security News.

Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations

Torrance, United States / California, May 1st, 2026, CyberNewswire Criminal IP partners with Securonix to integrate Criminal IP’s Threat Intelligence into ThreatQ, allowing organizations to incorporate external IP intelligence into their existing workflows, helping security teams accelerate analysis and response with more actionable context. Unlike traditional intelligence feeds, Criminal IP provides visibility into how assets […]

The post Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

BreachLock Named Representative Vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation

21 de Abril de 2026, 13:46

New York, United States, April 21st, 2026, CyberNewswire

BreachLock, a global leader in offensive security, today announced it has been named a representative vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation.  

This recognition marks the first time BreachLock has been identified in the Adversarial Exposure Validation (AEV) category since launching its agentic AI-powered Adversarial Exposure Validation platform in 2025.

Not only has the company gained recognition in the AEV market quickly, but BreachLock has also emerged as the only vendor offering adversarial exposure validation, Penetration Testing as a Service (PTaaS), and Continuous Attack Surface Management (CTEM) within one unified platform. 

Gartner defines adversarial exposure validation as “technologies that deliver consistent, continuous, and automated evidence of the feasibility of an attack,” identifying it as a key enabler of continuous threat exposure management programs.

“There is no other agentic offensive security solution on the market backed by the depth of real-world data and enterprise validation that BreachLock brings,” expressed Seemant Sehgal, Founder & CEO of BreachLock.

“Seven years of proven production safety backed by over 40,000 engagements and the trust of a growing base of Fortune 100 clients is what sets us apart. This recognition is a clear reflection of that.” 

Where many vendors offer adversarial exposure validation as a standalone tool, BreachLock delivers it alongside PTaaS and CTEM, which allows security teams to move from discovery and prioritization to validation to expert-led testing within a consolidated platform and single vendor.

BreachLock is one of the first vendors to offer autonomous penetration testing for both network and web environments, and it’s worth noting that the platform deploys agentlessly with no hardware or complex setup required. 

BreachLock’s autonomous penetration testing capabilities are powered by agentic AI trained on tens of thousands of real-world penetration tests and are proven to autonomously execute penetration tests at a senior penetration tester level.

BreachLock AEV emulates real-world adversaries safely across an organization’s live environment, mapping findings to the MITRE ATT&CK framework and, where authorized, moves laterally to and actively exploits vulnerabilities.

This takes understanding risk to a new level, proving exploitability rather than simply flagging theoretical risk. This benefits enterprise security teams substantially, helping them focus their remediation efforts and allocate resources where they matter most.  

For organizations determined to scale their offensive security testing capabilities both autonomously and with human expertise, BreachLock’s in-house penetration testers are available to conduct deeper investigations, manual assessments, and compliance-driven engagements through its PTaaS offering. 

About BreachLock 

BreachLock is a global leader in offensive security, delivering scalable and continuous security testing.

Trusted by global enterprises, BreachLock provides human-led and AI-powered attack surface management, penetration testing as a service, red teaming, and adversarial exposure validation solutions that help security teams stay ahead of adversaries.

With a mission to make proactive security the new standard, BreachLock is shaping the future of cybersecurity through automation, data-driven intelligence, and expert-driven execution. 

Disclaimer: Gartner does not endorse any company, vendor, product or service depicted in its publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.

Gartner publications consist of the opinions of Gartner’s business and technology insights organization and should not be construed as statements of fact.

Gartner disclaims all warranties, expressed or implied, with respect to this publication, including any warranties of merchantability or fitness for a particular purpose. 

GARTNER is a registered trademark of Gartner, Inc. and/or its affiliates. 

Contact

Marketing Communications Manager

Megan Charrois

BreachLock

megan.c@breachlock.com

The post BreachLock Named Representative Vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation appeared first on Cyber Security News.

Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action

10 de Abril de 2026, 05:08

Austin, Texas, United States, April 9th, 2026, CyberNewswire

Built by a veteran security team and led by a former Google and Mandiant executive, Mallory delivers intelligence that drives action for enterprise security teams.

Mallory is launching a AI-native threat intelligence platform, purpose-built to answer the questions CISOs and their teams are asking every day:

  • What are the real threat vectors for our organization?
  • What’s actually exploitable in our environment right now?
  • What should we proactively fix?

The platform monitors thousands of threat sources, contextualizes them against a user’s actual attack surface, and puts that intelligence to work across hunt, detection, and exposure management use cases. One platform. Answers, not alerts.

Modern teams receive more signals than ever and have structured their SOC around dealing with the deluge. But they’re still chasing alerts and struggling to get proactive, let alone work with business partners to close gaps before they’re exploited.

Mallory connects into the user’s existing tools and controls. When a new vulnerability or exposure surfaces, it doesn’t just flag it — it tracks who is exploiting it, where, and how, then determines whether the organization is actually at risk and what to do about it.

“Attackers are AI-enabled now, moving faster and with more capability. Defenders need to be too. Security teams don’t need more alerts. They need answers: what can attackers do, are our controls stopping them, and what’s exploitable right now,” says Mallory founder and CEO Jonathan Cran.

The result isn’t another feed or dashboard. It’s a prioritized set of evidence-based cases grounded in real threat intel, mapped to the user’s environment and ready for action.

“When a new alert makes the news, I need to know within minutes if we are impacted. Mallory delivers the context needed to investigate at AI speed,” says John Sapp, CISO of Texas Mutual Insurance.

Flexibility to build is critical in today’s cybersecurity ecosystem. Mallory is built by veteran security practitioners for security teams, with native support for Claude Code, MCP, API, and its own modern UI. Teams can integrate, automate, and extend on their terms.

Mallory also announced a seed investment led by Decibel Partners, with participation from Live Oak Venture Partners and a cadre of industry leaders from organizations including Google, Robinhood, Cisco, Fastly, and GreyNoise.

“Threat intelligence was built for an era where we would be able to process information at human speed. With the introduction of agents on the adversarial side, we no longer have data intel problem but rather a context and reasoning problem. Jonathan and the Mallory team are changing that by connecting real-time threat activity to an organization’s environment and processing it for relevance at agentic speed. ” says Dan Nguyen-Huu, partner at Decibel.

Mallory is available immediately as a SaaS platform with integrations across existing security tools. Users can start a 30-day free trial at mallory.ai/platform.

About Mallory

Mallory is the AI-native threat intelligence platform for cyber defenders. It monitors global adversary activity, contextualizes threats against assets and controls, and delivers prioritized, evidence-based answers.

Teams focus on what’s real and act faster. Users can learn more at mallory.ai.

Contact

Marketing

Chris Tilton

Mallory

press@mallory.ai

The post Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action appeared first on Cyber Security News.

❌
❌