The infinite eye: How AI threat intelligence gives defenders an asymmetric edge

In this session, Tod Beardsley and HD Moore (runZero) are joined by Jonathan Cran (Mallory) to discuss how AI-powered threat intelligence is providing defenders with a much-needed advantage in an increasingly noisy security landscape. Cran introduces Mallory, a platform designed to aggregate signal from diverse sources — including vendor blogs, OSINT, and the dark web — to provide real-time, contextualized intelligence. By moving beyond traditional CVE-based tracking and utilizing AI to filter out slop and fake exploits, defenders can answer critical questions about their exposure in minutes, often beating official vulnerability databases to the punch.

The conversation highlights a major shift in vulnerability management: the transition from waiting for official CVE numbers to tracking emerging threats through GitHub issues, mailing lists, and security advisories. HD Moore explains that as of 2026, the volume of new vulnerabilities has exploded while official enrichment from sources like the NVD has lagged, creating a gap that attackers frequently exploit. Mallory addresses this by performing entity resolution, identifying significant vulnerabilities before they have a formal name and helping organizations like runZero provide their customers with immediate search queries to find exposed systems in their environments.

Meet Our Speakers

todb

VP of Security Research, runZero

HD Moore

Founder & CEO, runZero

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Podcasts
Perimeters and pathways: Protecting the complete attack surface
Tod Beardsley, Jared Atkinson, Zakir Durumeric, and HD Moore discuss the perimeters and pathways that connect internal networks to the global...
Podcasts
Bug bounties in the age of AI
In this session, Tod Beardsley and Casey Ellis explore the evolving role of bug bounties in a world increasingly shaped by artificial intelligence.
Podcasts
The network edge: EOL and exploitation
Tod Beardsley is joined by Kimber Duke & Patrick Garrity of VulnCheck to discuss the critical intersection of EOL hardware and cybersecurity...
Podcasts
Mute the sirens: Prioritizing vulnerability noise
In this session, Tod Beardsley and Mark Lambert discuss the escalating challenge of managing vulnerability noise in the era of AI.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.