Intelligence Sources,
Coverage & FAQ
Everything you need to know about the data behind AEGIS and how it works.
Powered by authoritative sources
AEGIS pulls from five live data feeds. Every data point in the platform is sourced and cited.
Known Exploited Vulnerabilities catalog maintained by the Cybersecurity and Infrastructure Security Agency. Tracks actively exploited CVEs with remediation deadlines.
The industry-standard knowledge base of adversary tactics and techniques. AEGIS maps your security tools against 170+ techniques across the Enterprise matrix.
Real-time threat monitoring and analysis from the SANS Institute. Provides current threat level assessments and emerging attack intelligence.
Open source intelligence from leading cybersecurity publications: KrebsOnSecurity, BleepingComputer, and The Hacker News. Parsed via live RSS for sector-relevant threat news.
Exploit Prediction Scoring System. Machine learning model that estimates the probability a CVE will be exploited in the wild within 30 days.
Nine regulated industries
Each sector gets its own threat profile, compliance calendar, and risk model.