Cybersixgill Unveils Identity Intel Model for Threat Intelligence

Cybersixgill, a cyber threat intelligence data provider, announced today new features and capabilities that take security teams’ threat detection and mitigation efforts to new levels, helping them identify and mitigate vulnerabilities and detect and stop threats more quickly and effectively than ever before.

Cybersixgill’s new Identity Intelligence module enables centralized monitoring analysis of an organization’s compromised emails and accounts, helping threat hunters and analysts proactively manage their threat exposure by quickly and efficiently mitigating compromised access. Tens of millions of exposed accounts continue to be compromised by infostealers (stealer malware) every year, impacting corporate accounts, third-party services, and end-consumer credentials. Cybersixgill’s Identity Intelligence offering includes unparalleled visibility into millions of infostealer logs shared broadly across mass numbers of closed underground communities, with full host, username, and password information.

In addition, Cybsersixgill now offers a new Alerts page with many features designed to reduce mean time to respond (MTTR) and make alerts more actionable. Such features include better alert management, rich context for informed decision-making, enhanced customization with new filters and sorting options, and simplified access to actions and intelligence services. The new Alerts page helps threat analysts, SOC analysts, and incident responders identify risks and exposure and proactively prevent cyber-attacks before they take place.

As part of its Dynamic Vulnerability Exploit intelligence (DVE) module, Cybersixgill also announced its support of Open-Source Vulnerability (OSV) data. This support covers tens of thousands of open-source vulnerabilities not identified by the National Vulnerabilities Database (NVD). The solution incorporates insights from OSV.dev, a Google initiative focused on Common Vulnerability Exploits (CVEs) in open-source tools and programs, bridging the gap between vulnerability awareness and open-source software.

“Continuously anticipating and responding to our customers' demands, today we’re setting a new precedent in threat intelligence, addressing some of the most critical challenges for security teams and organizations across industries. By mapping CVEs to thousands of open-source vulnerabilities not currently supported by traditional threat intelligence tools, we’re empowering users to proactively address potential weaknesses in commonly used open-source programs and software bills of material, or SBOMs,” said Gabi Reish, Chief Product Officer for Cybersixgill. “Our new OSV Support significantly advances threat insights in organizations’ SBOMs by preventing unauthorized access, data breaches, and system compromises that could arise from unaddressed vulnerabilities.

“Additionally, our new Identity Intelligence module and Alerts page simplify security workflows around compromised credential monitoring and alert management, ensuring teams gain relevant insights into risks and vulnerabilities specific to their organization and asset inventory,” he continued. “These capabilities enable them to preemptively take swift action and stop threats from materializing into attacks, protecting sensitive data and systems from malicious access.”

Identity Intelligence Module: Mitigating Account Takeover (ATO) Fraud and Compromised Access

Compromised credentials are among the most common and effective weapons cybercriminals use to infiltrate corporate networks, steal sensitive data, encrypt data with ransomware, and launch broader campaigns. Detecting and remediating these initial access points is paramount to every organization concerned with the security and protection of systems and data.

Cybersixgill’s new Identity Intelligence module offers a centralized platform for identity intelligence, monitoring, and analyzing compromised emails and accounts. Among its many benefits are:

Helps mitigate account takeover (ATO) fraud

Reduces the mean time to detect threats

Decreases false positives related to irrelevant credential exposure

Alerts Page: Better Alert Management and Informed Decision-making

The new Alerts page was developed to improve security workflows and provide valuable insights. The page brings a multitude of benefits designed to make the user's life easier and more productive, including:

Split-screen mode for alert management

Rich context for informed decision-making

Enhanced customization with new filters and sorting options

Simplified access to actions and intelligence services

OSV Support: Enabling Vulnerability Awareness in Open-Source Software

The new OSV Support feature addresses the challenge of effectively managing vulnerabilities within open-source tools and programs. Organizations typically rely on open-source tools for the cost-effective and collaborative benefits they offer, yet their openly accessible source code can become a source of vulnerability exposure. Cybersixgill’s OSV Support mitigates the risk by providing real-time insights from OSV.dev, enabling organizations to identify and proactively address potential weaknesses.

The solution offers two key benefits:

Reduces risk through holistic vulnerability assessment

Improves corporate compliance

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.