Goals

This platform aims to enhance your security intelligence capabilities by facilitating the discovery, mapping, and visualization of relevant information to provide a comprehensive overview of your security landscape.

We serve as a complementary resource to identify and aggregate articles pertinent to your organization, functioning as a supplementary tool rather than replacing primary information sources.

The platform assists in researching and analyzing information related to your technology infrastructure, enabling you to maintain a holistic view for effective security posture management and risk assessment.

Search

Searching the index of tagged articles to find information related to your organization or investigation.

Search can be performed as freetext, keyword or ranges. All can be used in combination for greater queries.

Example searches

Here are some example searches to get started.

Fields

Each content entry has a number of tags that are indexed.

Sectors

Any sector that the article is related to. Example: "Public", "Private", and "Non-Profit"

sector:non-profit

Industries

Industries related to the content. Example: "Healthcare", "Government" and "Banking".

industries:banking

Technologies

Any technology mentioned or related in the article. Example: "iOS", "Linux" and "Android".

technologies:millennium

Countries

Any country or region related to the article, this could be "Sweden", "USA", "EMEA", and "Europe". There's some inconsistency in naming so different articles can be tagged with "UK" or "United Kingdom" but probably not both. You can use the OR operator to search for both at the same time.

countries:sweden

Tactic

MITRE ATT&CK tactics that apply to the content. Example: "Initial Access", "Credential Access".

tactics:"Privilege+Escalation"

Organizations

Organizations related to the content. Example: "Apple", "Microsoft", and "Ticketmaster"

organizations:"Tullverket"

Criticality

An attempt to assign a criticality score to the content. A numerical score from 0 to 10, where 0 means not critical and 10 is extremely critical.

criticality:>8

Urgency

An attempt to assign an urgency score to the content. A numerical score from 0 to 10, where 0 means no immediate action is needed and 10 means it must be handled immediately.

urgency:>8

Type

Type of the content, typically "news", "report", or "promotion".

type:report

CVE

Any Common Vulnerabilities and Exposures known to relate to the content. Example: "CVE-2024-23225".

cve:'CVE-2024-23225'

IPv4

Any IPv4 addresses mentioned in the content. Example: "192.168.1.1".

ipv4:0.0.0.0

IPv6

Any IPv6 addresses mentioned in the content. Example: "2001:0db8:85a3:0000:0000:8a2e:0370:7334".

ipv6:"2001:0db8:85a3:0000:0000:8a2e:0370:7334"

Domains

Domain names mentioned in the article. Example: "example.com", "maliciousdomain.org".

domains:protonmail.ch

Executables

Any executable file names mentioned, including file extensions such as .exe or .bat. Example: "malware.exe", "installer.bat".

executables:fontdiag.exe

Libraries

Any library or shared object file names mentioned, typically with extensions like .dll or .so. Example: "example.dll", "libexample.so".

libraries:ci.dll

Operators

AND

Can be used to combine operators to filter results.

countries:sweden AND sector:non-profit

OR

Can be used to expand searches to include multiple, otherwise exclusive results.

countries:(sweden OR norway)

NOT

Can be used to exclude certain results, possibly to remove a noisy term.

NOT sector:private

Graph

Visualization of information in a node graph. This is a way to visualize the information to gain new insight in relationship between pieces of information.

The graph is optimized for desktop.