Cyber intel for your stack.
25+ threat intelligence feeds. One-click vendor filtering. Hourly updates. No noise.
$ threatfilter --stack palo-alto,cisco,fortinet --severity high+
Fetching from 25 sources...
[CRIT 9.8] CVE-2026-XXXXX · Palo Alto PAN-OS auth bypass
Actively exploited in the wild · CISA KEV
→ advisory → nvd → details
[HIGH 8.1] Cisco IOS XE privilege escalation
PoC available · Cisco PSIRT
→ advisory → cve → details
[HIGH 7.9] Fortinet FortiOS heap overflow
Unproven exploitation · Fortinet PSIRT
→ advisory → cve → details
Updated 4 minutes ago. 3 items match your stack.
[v]
One-click stack filter
Click vendor logos to filter. URL captures your selection for bookmarks and sharing.
[!]
Severity + exploitation status
CVSS scores, critical/high/medium labels, and active exploitation flags from CISA KEV.
[@]
Geo targeting
Filter by targeted regions: US, EU, UK, JP, TW, AU, and more.
[t]
Hourly updates
25+ sources ingested every hour. Stale indicator if any source goes quiet.
Get notified when it launches
Daily 07:00 digest of high-severity items for your stack. Free. No spam.