PREVENTION

CVE Early Warning List

CVE Early Warning List

HOME  /  CEWL

CVE EARLY WARNING LIST

CEWL

“CTCI has developed a unique, intelligence-driven method to identify weaponized vulnerabilities that we have not yet come across in the industry...This is vital information for defenders as they need actionable intelligence to proactively protect their organizations.”  By Bill Ladd, Chief Data Scientist, Recorded Future

Stop being compromised from not knowing what to patch

CEWL (CVE Early Warning List), is the list of CVEs that threat actors are currently using or imminently about to use. With CVE threat intelligence CTCI see 10x more than any other threat intelligence company in the world, and our intelligence is timely with a lot of our CVEs added on the day of the CVE release. This answers the question one of the hardest questions, is this CVE something I should be concerned about? 

CVE Early Warning List
How to use CEWL in your organization

How to use CEWL in your organization

How to make your organization be intelligence-driven through using CEWL. This will allow better outcomes across the organization

ML-BASED ANALYTICAL TECHNIQUES

CEWL Architecture

CEWL™ can make our honeypots look like a large-scale SAP system or a Tesla charging station with just a couple of config changes. We have also developed an ML-driven web crawler. We have ML-based analytical techniques to identify the context of threat actors' conversations.

CEWL Architecture

TURN UNCERTAINTY INTO KNOWLEDGE

Intelligence Lifecycle

The start of any intelligence lifecycle begins with a question. And to us, that question is: "How do we turn uncertainty into knowledge by discovering what vulnerabilities are currently being exploited, or will be exploited in the near future?" From there, we leverage our custom cognitive reasoning machine learning in our wide and targeted collections capabilities. This technique gives a far more accurate and actionable intelligence than our competitors' keyword search methods.

Intelligence Lifecycle
Subtle%20Shapes%20Transparent_edited.png

WHY CHOOSE CTCI?

CTCI versus Our Competitors

Our competitors spend all the time collecting, we spend all the time analyzing to give you a curated, validated list of CVEs, instead a garbled list of links.

COMPETITOR

No Threat Determination

Analyst Does All The Work

No Validation Checking

Limited Correlation of Data Sources

No Conversational Understanding

Limited Honeypots

Mentioned (regex)

Low Accuracy, High Noise

VS

CTCI

ML

Threat Determination

POC Detection / Validation

Correlate With Other Data Sources

Determine The Conversation Outcome

Threat Actor Conversation

Is This An Exploit Conversation?

NLP Based Threat Collection

Highly Focused, High Fidelity

Our competition uses keyword mentions on websites such as Twitter and GitHub.

CTCI combines cognitive reasoning and machine learning with intelligence lifecycle collection to provide accurate, easy-to-use, actionable intelligence. 

Less time in Breaches, more time on Beaches™