vulnerability threat intelligence

Stay ahead of emerging threats

A real-time Vulnerability intelligence database that enables you to make quick and informed decisions.

Latest Exploits & Proof-of-concepts
Advisories, news and social
1000+ sources of intel
Get a demo
An overview card of a CVE (Common Vulnerabilities and Exposures), for CVE-2024-23113, from Cytidel's platform. The card highlights its risk, exploitability, and impact.
	•	Overview:
	•	A vulnerability in Fortinet FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager, allowing attackers to execute unauthorised code using specially crafted packets.
	•	Identified: Feb 12, 2024 | Updated: Nov 14, 2024.
	•	Threat Intelligence Metrics:
	•	News Mentions (Last 30 days): 2.
	•	Social Mentions (Last 30 days): 48.
	•	CVSS Score: 9.8 (Critical).
	•	EPSS Score: 1.84% (Probability of exploitation).
	•	Risk Rating: Significant (Highest severity).
	•	Visual risk scale confirms the highest rating.
	•	Tags & Associations:
	•	CISA KEV, NVD, Proof-of-Concept (POC), Known Threat Actor (KTA), Patch Tuesday (TUE), Public Exploit (PPE), Cytidel Spotlight (SPOT).
	•	Affected Entities:
	•	1 Vendor Listed.
	•	4 Products Listed.
	•	Linked CVEs: CVE-2024-21762, suggesting related vulnerabilities.

This overview provides detailed vulnerability intelligence, helping security teams assess, prioritise, and respond to threats efficiently.

"I'm enjoying a cup of tea and a break because of the speed and accuracy of your work which repeatedly keeps me ahead of the threats and the news-cycle. 
​


I personally recommend that everyone in my network, whether your a VP, director, or a manager like me, should check out Cytidel"

An Post
Threat Intelligence Manager
trending vulnerabilities & rising threats

Real-time vulnerability Trends

Stop spending hours trying to manually collate data for the latest trending vulnerabilities

Cytidel provides you with the latest trending vulnerabilities, exploits, and proof of concepts at the click of a button. Now your weekly vulnerability intelligence report can be done in minutes, not hours.

Cytidel's threat intelligence dashboard displaying trending CVEs based on news and social media activity.
	•	Timeframe Selection: Users can filter trends by Past 24 Hours, 48 Hours, 7 Days, or 30 Days.
	•	Trending Tags & Metrics:
	•	Trending in News or Social (348 CVEs)
	•	Rising Risk Rating (2019 CVEs)
	•	CISA KEV, EPSS, Proof-of-Concept, Public Exploit Alerts
	•	CVE Table with Key Data Points:
	•	CVE ID & Description: Each vulnerability entry includes details on affected vendors and exploitability.
	•	Vendors: Companies impacted (Fortinet, Cisco, Microsoft, etc.).
	•	CVSS & EPSS Scores: Common Vulnerability Scoring System (CVSS) and Exploit Prediction Scoring System (EPSS).
	•	Tags: Indicators like CISA KEV, Proof-of-Concept (POC), Known Threat Actor (KTA), Patch Tuesday (TUE), Public Exploit (PPE).
	•	Social & News Mentions: Number of discussions about the CVE in media and online.
	•	Risk Rating: Categorised as Significant, High, or Low, with red indicating the most critical vulnerabilities.

This dashboard helps security teams identify high-risk vulnerabilities gaining traction in public sources for real-time threat monitoring.
Cytidel's CVE notification dashboard displaying selected keywords and recent alerts for security vulnerabilities.
	1.	Keyword Selection Section:
	•	Users can choose keywords to trigger email notifications for relevant vulnerabilities.
	•	Selected keywords include Microsoft, Visual Studio, Mongo, Outlook, Adobe, and VMware.
	•	A toggle switch allows users to turn email notifications on or off.
	2.	Recent Notifications Table:
	•	Displays CVE alerts based on the selected keywords.
	•	Example entry from July 19, 2024, showing 3 CVEs related to Adobe and VMware.
	•	These vulnerabilities are categorized as Potential Public Exploits and are Trending in News or Social Media.
	•	A View button allows users to access more details.

The interface helps users track security threats in real time based on their specific areas of interest.a card containing the text "third party supplier monitoring" Cytidel RECON Alerts email notification displaying a daily update on newly identified security vulnerabilities.
	•	CVE ID: CVE-2024-10826 (linked for more details).
	•	Keyword(s): Google Chrome (indicating relevance to Chrome users).
	•	Category: Trending in News or Social (suggesting this vulnerability has gained attention).
	•	Description: A use-after-free vulnerability in the Family Experiences feature of Google Chrome on Android (prior to version 130.0.6723.116).
	•	Exploitable via a crafted HTML page.
	•	Chromium security severity level: High.
	•	Actionable Button: “View in RECON” to access more details.

This alert provides concise, real-time vulnerability intelligence for security teams monitoring emerging threats.
monitoring & alerting

Custom Alerting tailored to your needs

Set custom alerts based on keywords, vendors, or criteria you care about most.

Receive real-time notifications on threats that impact your environment, so you’re always prepared for the latest risks.

vulnerability bulk analyser

rank your Vulnerability backlog using the latest intelligence

Have vulnerabilities coming at you from multiple scanners, business units, or customers?

Effortlessly assess and prioritise these against the latest available intelligence with a simple upload to our bulk analysis engine.

Cytidel's bulk CVE analysis dashboard displaying insights from 90 unique CVEs. The dashboard is divided into two sections:
	1.	Risk Rating Level Overview:
	•	Significant Activity: 2 CVEs (2%) (Red)
	•	High Activity: 2 CVEs (2%) (Orange)
	•	Elevated Activity: 11 CVEs (12%) (Yellow)
	•	Moderate Activity: 0 CVEs (0%)
	•	Low Activity: 75 CVEs (83%) (Blue)
	2.	Intel Tags:
	•	CISA KEV: 2 CVEs (2%)
	•	Potential Proof-of-Concept: 2 CVEs (2%)
	•	Known Threat Actor(s): 2 CVEs (2%)
	•	Patch Tuesday: 90 CVEs (100%)
	•	Potential Public Exploit: 15 CVEs (16%)
	•	Cytidel Spotlight: 4 CVEs (4%)

The analysis highlights a high concentration of low-risk vulnerabilities (83%), while a small percentage (2-16%) have tags indicating heightened risk due to threat actors, exploits, or public proof-of-concept availability.a card with the text "you have analysed 90 unique CVEs"
A list of CVE (Common Vulnerabilities and Exposures) entries, each with a description and a risk rating. The CVEs are displayed in a structured format with unique identifiers, descriptions of the vulnerabilities, and their potential impact. The severity levels are highlighted with color-coded labels:
	•	Significant (Red) for high-risk vulnerabilities.
	•	High (Orange) for serious security threats.
	•	Moderate (Green) for less critical but still exploitable vulnerabilities.A risk rating scale displaying five levels of severity: Low, Moderate, Elevated, High, and Significant. The scale is visually represented as a horizontal gradient bar that intensifies in red as the severity increases. The current rating is marked as “High”, indicating a substantial security risk. A small information icon is present, suggesting additional details or explanations may be available.
Dynamic vulnerability risk ranking

Risk Ratings Backed by the latest Intelligence

Rapidly identify the 1% of vulnerabilities that need immediate action.

Cytidel’s risk algorithm dynamically rates each CVE across multiple levels (low, moderate, elevated, high, significant) based on real-time intelligence.

A Cytidel Spotlight intelligence report detailing a zero-day vulnerability linked to the Velvet Ant threat actor, a Chinese state-sponsored group.
	•	Key Details:
	•	The zero-day vulnerability was exploited to deploy custom malware with root privileges on vulnerable switches.
	•	Identified through forensic investigations by cybersecurity firm Sygnia.
	•	Attack Methodology:
	•	Attackers leveraged administrator credentials to access affected devices.
	•	Used crafted CLI configuration inputs to bypass validation and execute arbitrary commands as root.
	•	Gained full control over devices, enabling malware installation, espionage, data theft, and network disruption.
	•	Additional Context:
	•	The Cytidel Spotlight panel includes a notification for 7 new updates, indicating continued monitoring of high-risk threats.

This report provides critical intelligence for security teams, emphasising the urgency of patching affected systems to mitigate nation-state cyber threats.
EXPERT ANALYST NOTES

Expert CTI Analysis for top trending CVEs

Get analysis notes for top trending vulnerabilities from Cytidel's Cyber Threat Intelligence Team, plus remediation steps - helping you quickly triage and resolve emerging threats.

Threat actor database

Threat Actor Database

Gain deeper context on the adversaries targeting your industry.

Cytidel’s Threat Actor Database allows you to search for known threat actors, their aliases, and instantly see all linked vulnerabilities (CVEs) associated with their tactics.

Cytidel's threat actor profile page focused on Lazarus Group, a known cyber threat actor.
	•	Overview Section:
	•	Displays aliases for Lazarus, including APT38, Hidden Cobra, BlueNoroff, and Dark Seoul.
	•	CVE Link Count: 86 vulnerabilities associated with this group.
	•	Vendors Targeted: 65 organizations affected.
	•	Products Targeted: 711 affected software/products.
	•	Associated CVEs Table:
	•	Lists CVE IDs, descriptions, CVSS and EPSS scores.
	•	Tags: Indicators like CISA KEV, Proof-of-Concept (POC), Known Threat Actor (KTA), and Public Exploits (PPE).
	•	Social and News Mentions: Shows if the vulnerabilities are trending.
	•	Risk Ratings: Significant (marked in red) for all listed CVEs.

This dashboard provides a detailed intelligence view of Lazarus Group’s targeted vulnerabilities, helping security teams track high-risk exploits linked to nation-state or advanced persistent threats (APTs).a card showing CVE category "Associated with Threat Actors" with a count of 1 CVE
Cyridel's patch tuesday dashboard for November 2024, summarising 90 vulnerabilities across different severity levels and exploit types.

Key Metrics Overview:
	•	Total CVEs: 90
	•	Critical: 4
	•	Zero-Day Vulnerabilities: 2
	•	Remote Code Execution: 52
	•	Elevation of Privilege: 28
	•	Denial of Service: 4
	•	Information Disclosure: 1
	•	Spoofing: 3
	•	Security Feature Bypass: 2

CVE Table with Key Details:
	•	CVE ID: Unique identifier for each vulnerability.
	•	MSRC Link: Reference to Microsoft Security Response Center (if applicable).
	•	Component: Affected system or software (e.g., Windows Task Scheduler, Windows NTLM, Microsoft Exchange Server).
	•	MS Assessment: “Exploitation Detected” or “Exploitation More Likely” for each CVE.
	•	MS Exploited Tag: Whether the vulnerability is actively exploited.
	•	Public Disclosure: Indicates if details have been publicly disclosed.
	•	Vulnerability Type: Categorised as Elevation of Privilege, Spoofing, Security Feature Bypass, Denial of Service, etc.
	•	Published Date: All vulnerabilities listed were published on Nov 12, 2024.
	•	MS Severity: Classified as Important or higher.
	•	Risk Rating: Significant (Red), High (Orange), or Elevated (Yellow) based on impact.

This dashboard provides a structured view of vulnerabilities, enabling security teams to prioritise patching based on exploitability and risk level.
Patch tuesday dashboard

Patch Tuesday Dashboard

Know the Microsoft vulnerabilities that can't wait for your next patch cycle.

A simple Patch Tuesday dashboard that contains everything you need to keep up-to-date with each Patch Tuesday update, and monitor CVEs for any intel changes that require immediate action

regulation

Compliance in mind

Made for ISO27001:2022, DORA and PCI-DSS.

Cytidel was built by ISO27001 Auditors to help you stay on top of key Threat Intelligence and Vulnerability Management regulation.

Three compliance and security certification logos representing ISO 27001, DORA, and PCI-DSS.
	•	ISO 27001 (Left, Blue & Silver): Certification for Information Security Management, ensuring organizations follow best practices for data protection and risk management.
	•	DORA (Center, Yellow Stars & Text): Digital Operational Resilience Act (DORA), an EU regulation focusing on cyber resilience in financial services.
	•	PCI-DSS Compliance (Right, Green & White): Payment Card Industry Data Security Standard (PCI-DSS), ensuring secure handling of cardholder data to prevent fraud.

These certifications indicate adherence to international security standards and regulatory requirements for risk management, financial sector resilience, and payment security.

1000+ sources distilled into one simple, actionable view

Enhance your threat and vulnerability management capabilities with Cytidel. Thousands of intelligence sources vetted, analysed and mapped against CVEs in real-time

CISA logogithub logothe hacker news logomicrosoft logoreddit logodark reading logoivanti logonuclei logomastodon logobleeping computer logoMetasploit logogoogle logo

+ 1000 more

See what others are saying.

We’ve designed our solutions to help overcome the key challenges facing threat and vulnerability management teams

Quotation mark

“I have three things I love to talk about. My wife, my kids, and now Cytidel”

vulnerability analyst
Quotation mark

“Cytidel’s data collection is better than anything else I’ve seen on the market”

Threat intelligence specialist
Quotation mark

“Their threat intelligence capability and implementation is the best I have seen”

iso27001 auditor
Quotation mark

“This gives me the reassurance that I know I’m not missing something huge in the community”

vulnerability analyst
Quotation mark

"Time and time again Cytidel speeds up my day, saves me time and in doing so saves on budget and resources!. They are making a real impact over here.

Threat intelligence manager
Quotation mark

“Working with Cytidel has helped us rank and prioritise what to do next. They are passionate about information security, and it shows in the effective work they do.”

CISO
Vulnerability Intelligence

Adopt an intelligence-led approach today

Cytidel's threat intelligence dashboard displaying trending CVEs based on news and social media activity.
	•	Timeframe Selection: Users can filter trends by Past 24 Hours, 48 Hours, 7 Days, or 30 Days.
	•	Trending Tags & Metrics:
	•	Trending in News or Social (348 CVEs)
	•	Rising Risk Rating (2019 CVEs)
	•	CISA KEV, EPSS, Proof-of-Concept, Public Exploit Alerts
	•	CVE Table with Key Data Points:
	•	CVE ID & Description: Each vulnerability entry includes details on affected vendors and exploitability.
	•	Vendors: Companies impacted (Fortinet, Cisco, Microsoft, etc.).
	•	CVSS & EPSS Scores: Common Vulnerability Scoring System (CVSS) and Exploit Prediction Scoring System (EPSS).
	•	Tags: Indicators like CISA KEV, Proof-of-Concept (POC), Known Threat Actor (KTA), Patch Tuesday (TUE), Public Exploit (PPE).
	•	Social & News Mentions: Number of discussions about the CVE in media and online.
	•	Risk Rating: Categorised as Significant, High, or Low, with red indicating the most critical vulnerabilities.

This dashboard helps security teams identify high-risk vulnerabilities gaining traction in public sources for real-time threat monitoring.

frequently Asked Questions

These FAQs should help clarify how our platform can streamline and enhance your Threat And vulnerability management capabilities

Why is prioritising by CVSS not enough?

CVSS gives you a fixed score that measures the potential impact of a vulnerability, but in reality the risk posed by vulnerabilities changes daily. This can overwhelm your team and result in a lot of unnecessary work, as the average enterprise is Prioritising 73% of vulnerabilities for remediation when using CVSS score to rank risks. Cytidel uses dynamic risk ratings to keep your focus on the few vulnerabilities most likely to lead to a breach, while clearing lower risk vulnerabilities off your to-do list.

What sources do Cytidel monitor?

We monitor thousands of trusted sources across news, social media, vendor advisories, exploit repositories, and more. Whether you’re looking for celebrity vulnerabilities, or interested in the latest emerging zero-day vulnerabilities, we’ve got you covered. No more FOMO, no more switching between multiple platforms or endless scrolling - just log into the Cytidel platform and catch up on all the news you need to know.

How does Cytidel’s Risk Rating work?

Our risk rating is our secret sauce! We evaluate both new and existing vulnerabilities based on factors like threat scores, trending vulnerabilities, exploitation evidence, and threat intelligence prominence.

Can the risk rating be tailored to my organisation?

Cytidel’s risk rating is the cornerstone of your vulnerability ranking strategy, enabling you to rank vulnerabilities and remediate the risks that matter most to your organisation. While our default risk rating has been extensively tested to cater for most organisations starting out on their adoption of risk-based vulnerability management, some organisations want to tailor this to suit their risk tolerance levels and specific needs. Tailored risk ranking processes can be accommodated on our Enterprise plan. Our expert team are on hand to discuss your needs and support you in designing the workflow that works best for you.

Does Cytidel integrate with my tools or provide API access?

Cytidel’s vulnerability intelligence and risk ranking platform as a web-based SaaS portal allowing you to monitor the latest emerging risks. For customers on an Enterprise plan, our API can be made available. Custom integrations with your existing vulnerability scanning tools are available with a custom deployment designed specifically to suit your needs and integrate with your existing tech stack. Talk to a member of our team about how we can streamline your threat intelligence gathering and automate your vulnerability ranking processes.

Are Cytidel ISO27001:2022 certified?

Yes, we are! This certification reflects our commitment to the highest standards of information security and safeguarding our customers' data. We’ve also designed our platform to help organisations undergoing an ISO27001 assessment by automating intelligence gathering, analysing vulnerability trends, and providing tools to match scans against the latest threat intelligence - all tailored to your needs. Check out our blogpost on what’ve learnt in the process here.

Do I need to give Cytidel access to my data to get the benefits of the platform?

No, this isn’t mandatory. Our founders have decades of experience working in complex enterprise environments and understand the challenges of integrating new technologies. Cytidel was designed specifically to sit on top of your tech stack and allow you to get immediate value from the platform without the need to ingest and analyse your internal security data. When you’re ready to start integrating and automating processes, we’re here to help.

How does onboarding work?

While we believe we have made the Cytidel platform intuitive and easy to use, it is still a specialised product. This is why we recommend going with a demo to kick things off, after which we can either add you to a trial with a clear success plan, or get you and your team onboarded straight away. Account creation and registration takes just a few minutes, plus we have Stripe fully integrated into our portal for simple billing.

I don’t know if we’re ready for this. Is there something we can do first?

Don’t worry, you’re not alone here! Our founders built Cytidel because they found themselves regularly supporting clients who were still prioritising by CVSS, were overwhelmed with the volume of vulnerabilities, and didn’t know where to turn. If you want a member of the Cytidel team to guide you through the platform and help you get value from day 1, we’re more than happy to support you through a trial.