Click your stack. See only what matters.

25+ threat-intel feeds. Filter by vendor, severity, exploitation status, region, sector, and a selectable timeframe. Hourly updates. Free, no login.

How this works & data freshness

ThreatFilter pulls fresh advisories hourly from 25+ public sources (CISA KEV, NVD, vendor PSIRTs, regional CERTs, and independent security press). The freshness dot in the header shows how recently a source was fetched.

Vendor / severity / exploitation / sector tagging shown here is currently heuristic — it is derived in your browser by matching each item's title and summary against a 349-vendor alias catalog with word-boundary keyword rules. It is intentionally conservative (no loose substring hits) but it is not a substitute for the dedicated ML classifier; treat tags as a strong hint, and always open the source for ground truth.

Use the filter bar to narrow by vendor, severity, exploitation status, region, and sector. The Timeframe control (24h · 48h · 7d · 30d · 90d · All, default 7 days) sets how far back the feed reaches — picking a longer window fetches deeper history, not just the most recent items. Counts on each tile reflect the loaded window of items, not all-time.

Pick your vendors

Firewall / NGFW
Endpoint / EDR / EPP
SIEM / Log management
Vulnerability management
Cloud / IaaS
Identity / IAM / SSO
SASE / Zero Trust / SSE / VPN
Privileged access / PAM
Secrets / PKI / Certificates
Email security
Data security / DLP
Network hardware
Network detection / NDR / XDR
MDR / MSSP
WAF / DDoS / CDN
Virtualization / containers / K8s
Cloud / container / app security (CNAPP)
Operating systems / platforms
OT / ICS / SCADA
Backup / DR / Storage
SaaS / collaboration
Web / CMS / dev tooling
Databases / data platforms
Threat intel / TIP / EASM
Browsers
Timeframe
Severity
Status
Region
Sector
?

Boolean search syntax

  • cisco vpn — both words must appear (implicit AND)
  • cisco OR fortinet — either word
  • cisco AND vpn NOT ios — combine; NOT excludes
  • "zero day" — exact phrase in quotes
  • (rce OR "remote code") AND linux — parenthesised groups
  • cve-2024 — plain words still substring-match for back-compat

Case-insensitive. Operators are case-sensitive (must be uppercase).

loading…