A New Approach to Cyber Intelligence

Enabling security teams to stay ahead of the threat using cutting edge AI-native tooling and capabilities.

GET EARLY ACCESS
Real Time contextualIZED Intelligence
Ask about
  • CVE's
  • Threat Actors
  • Exploits
  • Am I affected by the latest ShinyHunters campaign?
  • Am I affected by CVE-2025-0108?
  • What are the ttps associated with APT43?
  • Who are ShinyHunters?
  • EPSS
    • Percentile
      72%
    • Probability
      41%
    • CVSS V3.1
      9.8
    • Attack Vector
      NETWORK
    • Attack Complexity
      low
    • Privileges Required
      None
    • User Interaction
      None
    • Scope
      UNCHANGED
    • Confidentiality Impact
      high
    • Integrity Impact
      high
    • Availability Impact
      high
    • Base Score
      9.8
    • Availability Impact
      CRITICAL
    • Base Score
      0
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    EPSS
    • Percentile
      72%
    • Probability
      41%
    • CVSS V3.1
      9.8
    • Attack Vector
      NETWORK
    • Attack Complexity
      low
    • Privileges Required
      None
    • User Interaction
      None
    • Scope
      UNCHANGED
    • Confidentiality Impact
      high
    • Integrity Impact
      high
    • Availability Impact
      high
    • Base Score
      9.8
    • Availability Impact
      CRITICAL
    • Base Score
      0
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    EPSS
    • Percentile
      72%
    • Probability
      41%
    • CVSS V3.1
      9.8
    • Attack Vector
      NETWORK
    • Attack Complexity
      low
    • Privileges Required
      None
    • User Interaction
      None
    • Scope
      UNCHANGED
    • Confidentiality Impact
      high
    • Integrity Impact
      high
    • Availability Impact
      high
    • Base Score
      9.8
    • Availability Impact
      CRITICAL
    • Base Score
      0
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Tactic
    Techniques
    References
    Resource Development
    1
    2 Sources
    Initial Access
    1
    2 Sources
    Discovery
    1
    2 Sources
    Defense Evasion
    1
    2 Sources
    Execution
    1
    2 Sources
    Tactic
    Techniques
    References
    Resource Development
    1
    2 Sources
    Initial Access
    1
    2 Sources
    Discovery
    1
    2 Sources
    Defense Evasion
    1
    2 Sources
    Execution
    1
    2 Sources
    Primary target sectors
    • Healthcare
      20%
    • Manufacturing
      15%
    • Public/Government
      14%
    • Financial Services
      11%
    • Food and Supply Chain
      9%
    8 updates in the last year
    2024
    All
    Many Malware Campaigns Linked to Proton66 Network
    The king thought long and hard, and finally came up with a brilliant plan: he would tax the jokes in the kingdom.
    Date: 4/22/2025, 12:00:00 AM
    Exploit in the wild
    2 Sources
    • peerspot.com/categories/cis…
    • cert.europa.eu/publications/security-advisories/2025-021
    • www.scworld.com
    • www.techradar.com/news/cybersecurity
    • www.infosecurity-magazine.com/news/new-cybersecurity-trends-2025
    • www.securityweek.com/articles/2025-cyber-threats
    • www.krebssecurity.com/2025-data-breach-reports
    • peerspot.com/categories/cis…
    • cert.europa.eu/publications/security-advisories/2025-021
    • www.scworld.com
    • www.techradar.com/news/cybersecurity
    • www.infosecurity-magazine.com/news/new-cybersecurity-trends-2025
    • www.securityweek.com/articles/2025-cyber-threats
    • www.krebssecurity.com/2025-data-breach-reports

    Mallory is built to help you understand, contextualize, and take action on threats that matter.

    DOMAIN
    SPECIFIC LLM
    DATA CORRELATION
    & ENRICHMENT
    SUBSCRIPTIONS
    & INTELLIGENT AUTOMATION
    AGENTIC ANALYSIS
    & RESEARCH
    OSINT
    Dark Web
    Commercial Intel
    Threat Profile
    Tech Profile
    Org Context

    Correlate and Contextualize your Intelligence Universe

    IOCs
    Vulnerabilities
    Dark Web
    Threat Actors
    Current Events

    Customize Mallory to your specific security workflows

    Set up intelligent notifications that fit your existing processes, enabling immediate action when a threat is discovered.
    GET EARLY ACCESS

    Search contextualized real-time intelligence

    Always-on collect enables you to research and organize data around PIRs important to your organization.
    GET EARLY ACCESS

    Improve MTTD

    Investigate and prioritize IoCs on threats relevant to your organzation.

    Scale Response

    Dig into TTPS and Attack Patterns that need hunting and discovery.

    Enable Remediation

    Are you affected? Know in minutes, not hours or days.

    Ensure Compliance

    Tie your actions to required compliance mandates and ensure you're delivering value.

    Early Access

    Ready to Supercharge your Security Operations?

    Thank you! Your submission has been received!
    Oops! Something went wrong while submitting the form.
    Mallory process diagram