Track threats from vulnerabilities that others define as irrelevant, but have a higher probability of being exploited. Gain total context with the only solution that predicts the immediate risks of a vulnerability based on threat actors’ intent.
Learn more about the entire CVE lifecycle: pick up dark web chatter regarding the CVE (POC exploit codes from Github, closed sources, instant messaging apps etc), track CVE mention history, and see CVE rating updates as well as actual exploit history.
Gain a clear view about the vulnerability map, top CVE-related forums, CVE dynamic rating vs. CVSS 2.0 and more.
Gain better understanding of each CVE: learn more about actors, tools, dates, mentions, tags, languages and more (portal only).
Know an exploit is published or a vulnerability is discussed before threat actors even think of using it
Track threats from CVEs that have a higher probability of being exploited by active threat actors in the cyber underground
Omni-channel collection sourced from the largest collection of threat intelligence related to vulnerabilities
Leverage insights that allow proactive remediation and prevention
With the most comprehensive collection of vulnerability-related threat intelligence, organized and arranged for easy consumption, Cybersixgill brings visibility and clarity into the vulnerability management process to enable agile operations that are based on real-time data and insights. This accelerates VM teams, systems, and processes – maximizing their performance as well as their results.
The Cybersixgill DVE Score is derived from automated AI analysis of underground discourse on deep and dark web forums and is combined with intelligence from other sources, such as code repositories and technical know-how. This empowers you to track threats from CVEs that most others define as irrelevant or obsolete and have a higher probability of being exploited by active threat actors in the cyber underground.
Cybersixgill’s proprietary technology provides a complementary approach to NVD’s static CVSS score, adding a much-needed dimension of probability. It ultimately helps you answer that critical question: how likely will this CVE be exploited in the near future?
Automatically gain access to remediation information for each vulnerability directly from NVD, MITRE and other vendor sites.
Receive a full intelligence picture of the vulnerability, complete with context – including a comprehensive audit trail of the data we have collected on the actors and their discourse, exploit kits, attribution to malware, APT and ransomware. This includes a score of the likelihood a vulnerability will be exploited over the next 90 days, hours after the CVE is first published. Unlike CVSS, this score is continually updated in real-time in response to the threat intelligence we gather.
Map vulnerabilities to MITRE ATT&CK framework to anticipate how, when or why criminals will exploit each vulnerability, listing the CVEs used in the context of each technique to assess the risk to your organization and prioritize remediation efforts.
Accurately match organizational CPEs identified in step 1 to specific, related vulnerabilities (CVEs) to determine which vulnerabilities are exposing your systems to attack.
Discover and scope the relevant organizational assets (ie. CPEs) and vulnerabilities (ie CVEs) or identify specific CPEs and CVEs that are of interest.