PREVENTION
CVE Early Warning List
HOME / CEWL
CVE EARLY WARNING LIST
CEWL
“CTCI has developed a unique, intelligence-driven method to identify weaponized vulnerabilities that we have not yet come across in the industry...This is vital information for defenders as they need actionable intelligence to proactively protect their organizations.” By Bill Ladd, Chief Data Scientist, Recorded Future
Stop being compromised from not knowing what to patch
CEWL (CVE Early Warning List), is the list of CVEs that threat actors are currently using or imminently about to use. With CVE threat intelligence CTCI see 10x more than any other threat intelligence company in the world, and our intelligence is timely with a lot of our CVEs added on the day of the CVE release. This answers the question one of the hardest questions, is this CVE something I should be concerned about?

How to use CEWL in your organization
How to make your organization be intelligence-driven through using CEWL. This will allow better outcomes across the organization
ML-BASED ANALYTICAL TECHNIQUES
CEWL Architecture
CEWL™ can make our honeypots look like a large-scale SAP system or a Tesla charging station with just a couple of config changes. We have also developed an ML-driven web crawler. We have ML-based analytical techniques to identify the context of threat actors' conversations.

TURN UNCERTAINTY INTO KNOWLEDGE
Intelligence Lifecycle
The start of any intelligence lifecycle begins with a question. And to us, that question is: "How do we turn uncertainty into knowledge by discovering what vulnerabilities are currently being exploited, or will be exploited in the near future?" From there, we leverage our custom cognitive reasoning machine learning in our wide and targeted collections capabilities. This technique gives a far more accurate and actionable intelligence than our competitors' keyword search methods.


WHY CHOOSE CTCI?
CTCI versus Our Competitors
Our competitors spend all the time collecting, we spend all the time analyzing to give you a curated, validated list of CVEs, instead a garbled list of links.
COMPETITOR
No Threat Determination
Analyst Does All The Work
No Validation Checking
Limited Correlation of Data Sources
No Conversational Understanding
Limited Honeypots
Mentioned (regex)
Low Accuracy, High Noise
VS
ML
Threat Determination
POC Detection / Validation
Correlate With Other Data Sources
Determine The Conversation Outcome
Threat Actor Conversation
Is This An Exploit Conversation?
NLP Based Threat Collection
Highly Focused, High Fidelity
Our competition uses keyword mentions on websites such as Twitter and GitHub.
CTCI combines cognitive reasoning and machine learning with intelligence lifecycle collection to provide accurate, easy-to-use, actionable intelligence.

Less time in Breaches, more time on Beaches™