AI Tools for Security Operations Center Analysts
AI tools that help SOC analysts research threat intelligence, investigate CVEs, scan for vulnerabilities, check IP reputation, and document incident responses.
Works in Chat, Cowork and Code
CVE and vulnerability research
Instantly look up any CVE for severity scores, affected versions, patch availability, and active exploitation status. Monitor newly published critical vulnerabilities to triage patching priority for your organization's asset inventory.
CVE-2024-21762: CVSS 9.6 (Critical). FortiOS SSL-VPN out-of-bounds write vulnerability. Affected: FortiOS 6.x, 7.x (multiple branches). Exploitation: ACTIVELY EXPLOITED in the wild (CISA KEV listed). Patch: Available — FortiOS 7.4.3+ and 7.2.7+. CISA deadline for federal agencies: 72 hours. Recommend immediate priority patching for all exposed SSL-VPN endpoints.
IP and domain threat investigation
Check suspicious IP addresses, domains, and URLs against threat intelligence feeds before they escalate to incidents. Get geolocation, ASN information, and known malicious activity history to prioritize alert investigation.
IP 194.165.16.11: Located in Netherlands (AS 206092, bulletproof hosting provider with history of abuse). Threat reputation: HIGH RISK — listed in AbuseIPDB (47 reports, last 30 days), URLhaus (associated with malware distribution). Known for: Cobalt Strike C2 infrastructure per threat intel feeds. Recommend: block immediately and review all connections in the past 72 hours.
Threat intelligence and APT research
Research active threat actor groups, their TTPs (tactics, techniques, and procedures), and recent campaign activity. Understand the threat landscape relevant to your industry to improve detection rules and response playbooks.
Scattered Spider Q1 2024 activity: Primary vector: vishing and SMS phishing targeting IT helpdesks for credential resets. New tools observed: Oktapus phishing kit updated, AMOS infostealer on macOS. Targeting: expanded from telecom to financial services and gaming. Key defense: implement strict identity verification for all password reset requests, monitor for SIM-swapping activity.
Supply chain and dependency risk monitoring
Audit open-source packages and software dependencies in your environment for known vulnerabilities, malicious packages, and advisories. Identify exposure from third-party software supply chain attacks.
Audit results: log4js — 2 advisories (non-critical), patched in current version. axios — 1 high-severity SSRF CVE (CVE-2023-45857) in versions <1.6.0. lodash — 3 prototype pollution CVEs; upgrade to 4.17.21+. express — clean on latest. jsonwebtoken — 1 critical CVE (CVE-2022-23529) in <9.0.0. Immediate action: patch axios and jsonwebtoken.
Incident response documentation
Rapidly compile incident timelines, IOC lists, and response actions into structured incident reports. Generate post-incident summaries for management briefings and regulatory notifications.
Generated formal Incident Response Report: Executive summary, timeline of events (detection → containment → recovery), technical findings (ransomware variant, IOCs, affected systems count), containment and eradication actions, recovery timeline (16h 28m total), and recommendations. Formatted for CISO briefing and meets NIST IR framework documentation standards.
Phishing email analysis
Analyze suspicious emails reported by end users to quickly determine if they are phishing attempts, identify indicators of compromise, and determine appropriate response actions.
PHISHING DETECTED — High Confidence. Sender domain "company-helpdesk.net" not affiliated with any known legitimate entity. Domain registered 4 days ago. Link "login.company-verified-portal.com": scanned against 70+ AV engines — 12 detections (credential harvesting). Lookalike domain pattern (typosquatting). Recommend: quarantine email, block sender domain and link URL, notify affected users.
Ready-to-use prompts
Get full details on the 5 most critical CVEs published this week affecting Windows Server and Active Directory, including CVSS scores, affected versions, and patch availability.
Check the threat reputation, geolocation, ASN, and known malicious activity for these 3 IP addresses that appeared in our intrusion detection alerts.
Scan this domain that appeared in a phishing email for malware, certificate anomalies, redirect chains, and check it against URLhaus and AbuseIPDB.
Research current MITRE ATT&CK techniques being used by state-sponsored threat actors targeting healthcare sector organizations. Include specific TTPs and detection recommendations.
Audit this list of Python packages from our requirements.txt for known CVEs, malicious indicators, and any advisories published in the past 90 days.
Analyze this suspicious email for phishing indicators: sender domain, header anomalies, embedded links, and whether the urgency tactics match known phishing kit patterns.
Draft a post-incident report for a Business Email Compromise incident where an attacker redirected vendor payments totaling $240,000 by compromising a finance employee's email account over 3 weeks.
Search for all CVEs rated 9.0+ published in the last 7 days that affect network infrastructure products (routers, firewalls, VPN appliances). Flag any with known active exploitation.
Tools to power your best work
165+ tools.
One conversation.
Everything security operations center analysts need from AI, connected to the assistant you already use. No extra apps, no switching tabs.
Security alert triage
When a SIEM alert fires, rapidly investigate the key indicators to determine if it's a true positive and what response is required.
Threat intelligence enrichment
Enrich threat intelligence from detection tools with contextual research to understand attacker TTPs and improve detection rules.
Monthly vulnerability patch briefing
Prepare the monthly vulnerability briefing for patch management review with current critical CVE data.
Frequently Asked Questions
How current is the CVE data in Vulnerability Database?
Vulnerability Database indexes the full NVD (National Vulnerability Database) CVE catalog and updates continuously as new CVEs are published. You can search by keyword, look up specific CVE IDs, and monitor recent critical vulnerabilities. CVSS scores and exploitation status are pulled from NVD and CISA KEV.
What threat intelligence sources does Security Scanner check?
Security Scanner checks URLs, domains, IPs, and file hashes against 70+ antivirus engines, URLhaus, AbuseIPDB, PhishTank, and other threat intelligence feeds. It combines results from multiple sources to give confidence-weighted verdicts, which is useful for quickly triaging suspicious indicators.
Can IP Geolocation help identify TOR exit nodes and VPN infrastructure?
IP Geolocation returns ASN information, which can identify hosting providers associated with bulletproof hosting, VPN services, and anonymization networks. While it doesn't specifically flag every TOR exit node, the combination of ASN reputation, geolocation anomalies, and threat database lookups provides strong context for IP investigation.
How does Supply Chain Risk audit work for software dependencies?
Supply Chain Risk checks open-source package versions against advisory databases and CVE records. You can submit package names and versions from requirements.txt, package.json, or similar files. It returns CVEs, exploitability data, and fix versions — useful for rapid dependency risk assessment before or after a security advisory.
Can Content Repurposer generate regulatory-compliant incident reports?
Content Repurposer generates well-structured incident reports following common frameworks like NIST IR. For regulatory notification requirements (GDPR 72-hour rule, SEC cybersecurity disclosure), use the output as a draft and have your legal and compliance teams review before submission, as specific language and timing requirements vary by regulation.
Give your AI superpowers.
Works in Chat, Cowork and Code