Goals
This platform aims to enhance your security intelligence capabilities by facilitating the discovery, mapping, and visualization of relevant information to provide a comprehensive overview of your security landscape.
We serve as a complementary resource to identify and aggregate articles pertinent to your organization, functioning as a supplementary tool rather than replacing primary information sources.
The platform assists in researching and analyzing information related to your technology infrastructure, enabling you to maintain a holistic view for effective security posture management and risk assessment.
Search
Searching the index of tagged articles to find information related to your organization or investigation.
Search can be performed as freetext, keyword or ranges. All can be used in combination for greater queries.
Example searches
Here are some example searches to get started.
Vulnerabilities
Important
Filtering
Article origin
Time ranges
Other
Fields
Each content entry has a number of tags that are indexed.
Sectors
Any sector that the article is related to. Example: "Public", "Private", and "Non-Profit"
sector:non-profitIndustries
Industries related to the content. Example: "Healthcare", "Government" and "Banking".
industries:bankingTechnologies
Any technology mentioned or related in the article. Example: "iOS", "Linux" and "Android".
technologies:millenniumCountries
Any country or region related to the article, this could be "Sweden", "USA", "EMEA", and "Europe". There's some inconsistency in naming so different articles can be tagged with "UK" or "United Kingdom" but probably not both. You can use the OR operator to search for both at the same time.
countries:swedenTactic
MITRE ATT&CK tactics that apply to the content. Example: "Initial Access", "Credential Access".
tactics:"Privilege+Escalation"Organizations
Organizations related to the content. Example: "Apple", "Microsoft", and "Ticketmaster"
organizations:"Tullverket"Criticality
An attempt to assign a criticality score to the content. A numerical score from 0 to 10, where 0 means not critical and 10 is extremely critical.
criticality:>8Urgency
An attempt to assign an urgency score to the content. A numerical score from 0 to 10, where 0 means no immediate action is needed and 10 means it must be handled immediately.
urgency:>8Type
Type of the content, typically "news", "report", or "promotion".
type:reportCVE
Any Common Vulnerabilities and Exposures known to relate to the content. Example: "CVE-2024-23225".
cve:'CVE-2024-23225'IPv4
Any IPv4 addresses mentioned in the content. Example: "192.168.1.1".
ipv4:0.0.0.0IPv6
Any IPv6 addresses mentioned in the content. Example: "2001:0db8:85a3:0000:0000:8a2e:0370:7334".
ipv6:"2001:0db8:85a3:0000:0000:8a2e:0370:7334"Domains
Domain names mentioned in the article. Example: "example.com", "maliciousdomain.org".
domains:protonmail.chExecutables
Any executable file names mentioned, including file extensions such as .exe or .bat. Example: "malware.exe", "installer.bat".
executables:fontdiag.exeLibraries
Any library or shared object file names mentioned, typically with extensions like .dll or .so. Example: "example.dll", "libexample.so".
libraries:ci.dllOperators
AND
Can be used to combine operators to filter results.
countries:sweden AND sector:non-profitOR
Can be used to expand searches to include multiple, otherwise exclusive results.
countries:(sweden OR norway)NOT
Can be used to exclude certain results, possibly to remove a noisy term.
NOT sector:privateGraph
Visualization of information in a node graph. This is a way to visualize the information to gain new insight in relationship between pieces of information.
The graph is optimized for desktop.