Active CVEs
Vulnerabilities under live exploitation — what dropped this week, who's exposed, what to do before Monday. Same shape as the analyses in the hub.
Threat actors
Group profiles, capability shifts, infrastructure overlaps. Written with attribution discipline — we name what's known, hold what isn't.
Campaign tracking
Multi-incident operations linked by shared TTPs, victimology, or infrastructure. Long-running coverage where one CVE doesn't tell the whole story.
Emerging threats
Pre-CVE exposure patterns we see surfacing — misconfiguration trends, scanner blind spots, attacker primitives that haven't yet earned a CVE.
IOC reporting
Published indicators (hashes, IPs, JA3s, JARM) when artifacts merit standalone publication. IOCs are facts, not copyrightable, free to consume.
Attribution discipline
How we handle uncertainty. What we publish, what we hold, when we say "unknown." Independent research means being honest about source posture.