CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 03, 2026

Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations

Cybersecurity News Archived May 03, 2026 ✓ Full text saved

Torrance, United States / California, May 1st, 2026, CyberNewswire Criminal IP partners with Securonix to integrate Criminal IP’s Threat Intelligence into ThreatQ, allowing organizations to incorporate external IP intelligence into their existing workflows, helping security teams accelerate analysis and response with more actionable context. Unlike traditional intelligence feeds, Criminal IP provides visibility into how assets […] The post Criminal IP and Securonix ThreatQ Collaborate to Enhance

Full text archived locally
✦ AI Summary · Claude Sonnet


    Discover more Computer Servers Network Security Security Products & Services HomePress Release Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations By Cybernewswire May 1, 2026 Torrance, United States / California, May 1st, 2026, CyberNewswire Criminal IP partners with Securonix to integrate Criminal IP’s Threat Intelligence into ThreatQ, allowing organizations to incorporate external IP intelligence into their existing workflows, helping security teams accelerate analysis and response with more actionable context. Unlike traditional intelligence feeds, Criminal IP provides visibility into how assets and infrastructure are exposed across the internet. By embedding this data into ThreatQ, organizations can incorporate real-world context into investigations without disrupting existing processes. ThreatQ centralizes and prioritizes threat data from multiple sources. With Criminal IP integrated, organizations can enrich this data with continuously updated, exposure-based intelligence, strengthening investigation and response workflows without added complexity. Automated Intelligence Enrichment at Scale Within the integrated environment, Criminal IP’s threat intelligence APIs automatically enrich incoming IP indicators in ThreatQ with contextual data such as maliciousness scoring, VPN and proxy detection, remote access exposure, open ports, and known vulnerabilities. Powered by ThreatQ’s data-driven orchestration engine, organizations can configure automated workflows that continuously evaluate incoming indicators against Criminal IP’s threat database. This ensures that threat context remains current without requiring manual analyst effort, supporting faster triage and more consistent prioritization. Real-Time Investigation Within a Unified Workspace <caption: Criminal IP intelligence integrated into the ThreatQ dashboard, enabling unified visibility into enriched indicators and risk context> The integration allows analysts to access Criminal IP intelligence directly within the ThreatQ interface, enabling real-time validation of suspicious IP activity without switching tools. By combining exposure data with infrastructure-level insights, teams can assess risk more effectively within their existing workflows. Analysts can also perform on-demand Criminal IP lookups directly from indicator detail views or investigation boards, providing immediate access to additional context during active investigations. Criminal IP further enhances ThreatQ’s investigation graph by revealing relationships between IP addresses, associated infrastructure, and attack activity, helping analysts better understand connections and patterns across threats. Intelligence-Driven Prioritization and Response <caption: Criminal IP enrichment integrated within the ThreatQ Orchestrator, enabling automated ingestion and filtering of exposure-based IP intelligence directly into analysis workflows> By integrating Criminal IP’s intelligence into ThreatQ’s scoring framework, organizations can align risk evaluation with their specific operational environment. This enables more precise prioritization and supports more effective decision-making during investigations. Enriched data can also be visualized through dashboards, providing clearer visibility into maliciousness trends, VPN usage, and risk distribution across indicators. Expanding Visibility with Exposure Intelligence The integration highlights the growing importance of exposure-based intelligence in modern threat analysis. By continuously monitoring and analyzing internet-facing assets and IP infrastructure, Criminal IP provides differentiated visibility that extends beyond traditional indicator-based approaches. “This integration enables organizations to bring IP reputation and exposure intelligence directly into the ThreatQ platform, supporting faster analysis and more effective response throughout the investigation lifecycle,” said Byungtak Kang, CEO of Criminal IP. “By integrating our intelligence into existing workflows, security teams can improve visibility and make more informed decisions without adding operational complexity.” “This collaboration strengthens the role of IP intelligence at critical points of investigation and decision-making,” said Scott Sampson, Chief Revenue Officer, Securonix. “By combining ThreatQ’s orchestration and prioritization capabilities with Criminal IP’s real-time threat data, organizations can accelerate enrichment processes, reduce manual workloads, and focus on the most relevant threats within their environment.” Through this partnership, Criminal IP and Securonix enable security teams to operationalize threat intelligence more effectively by integrating automated enrichment, workflow orchestration, and precise prioritization within the ThreatQ platform. About Criminal IP Criminal IP is a cyber threat intelligence solution operated by AI SPERA that provides decision-ready IP address and domain reputation data to security teams worldwide. By continuously scanning the global internet, Criminal IP aggregates and contextualizes threat signals across IPs, domains, URLs, and attack infrastructure, covering malicious indicators, known vulnerabilities, exposed assets, and attacker behavior. Criminal IP’s mission is to give organizations real visibility into their cyber landscape and accelerate threat detection and response by delivering the intelligence needed to outsmart attackers. For more information, users can visit www.criminalip.io. About Securonix Securonix is transforming security operations with the industry’s first Unified Defense SIEM with Agentic AI, built to decide and act across the threat lifecycle with a human-in-the-loop philosophy. Its cloud-native platform unifies detection, investigation, and response, while enabling Sam, the AI SOC Analyst, and a productivity-based AI operating model for the SOC, so organizations can measure and govern AI by the analyst work it delivers. Helping enterprises become Breach Ready and Board Ready, Securonix delivers accountable, outcome-driven security operations at scale. Recognized as a Leader in the Gartner Magic Quadrant for SIEM and a Customers’ Choice by Gartner Peer Insights, Securonix delivers trusted security operations for global enterprises. Uses can learn more at www.securonix.com. Contact Michael Sena Criminal IP support@aispera.com Copy URL Linkedin Twitter ReddIt Telegram Cybernewswirehttps://cybernewswire.com/ A PR Newswire Syndication Platform for Cybersecurity Companies. Trending News New Vidar Malware Campaign Uses Fake YouTube Software Downloads to Steal Corporate Credentials Fake Document Reader On Google Play With 10K Downloads Installing Anatsa Malware Hackers Breach Government and Military Servers by Exploiting cPanel Vulnerability Litecoin Zero-Day Vulnerability Exploited in DoS Attack, Disrupts Major Mining Pools Critical Wireshark Vulnerabilities Let Attackers Execute Arbitrary Code Via Malformed Packets Latest News Cyber Attack News Hackers Breach Government and Military Servers by Exploiting cPanel Vulnerability Cyber Security News Multiple Exim Mail Server Vulnerabilities Leads to Crash with Malicious DNS data Cyber Security News Attackers Deploy AiTM Phishing Pages to Access SharePoint, HubSpot, and Google Workspace Cyber Security News Attackers Abuse Google AppSheet, Netlify, and Telegram in Facebook Phishing Campaign Cyber Security News cPanelSniper – PoC Exploit Disclosed for cPanel Vulnerability, 44,000 Servers Compromised
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    May 03, 2026
    Archived
    May 03, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗