In this session, Tod Beardsley and HD Moore (runZero) are joined by Jonathan Cran (Mallory) to discuss how AI-powered threat intelligence is providing defenders with a much-needed advantage in an increasingly noisy security landscape. Cran introduces Mallory, a platform designed to aggregate signal from diverse sources — including vendor blogs, OSINT, and the dark web — to provide real-time, contextualized intelligence. By moving beyond traditional CVE-based tracking and utilizing AI to filter out slop and fake exploits, defenders can answer critical questions about their exposure in minutes, often beating official vulnerability databases to the punch.
The conversation highlights a major shift in vulnerability management: the transition from waiting for official CVE numbers to tracking emerging threats through GitHub issues, mailing lists, and security advisories. HD Moore explains that as of 2026, the volume of new vulnerabilities has exploded while official enrichment from sources like the NVD has lagged, creating a gap that attackers frequently exploit. Mallory addresses this by performing entity resolution, identifying significant vulnerabilities before they have a formal name and helping organizations like runZero provide their customers with immediate search queries to find exposed systems in their environments.
Watch more sessions from runZero Day
| Session Title | Guests | |
|---|---|---|
| Watch Session | A CVE quagmire: Quality versus quantity | Jerry Gamblin, RogoLabs |
| Watch Session | Predicting exploitation: A practitioner's guide | Jay Jacobs, Empirical Security |
| Watch Session | Signal vs slop: Journalists on the evolution of research-driven reporting | Bill Brenner, CYBER.SEC.Community Dennis Fisher, Decipher Steve Ragan, 1Password |
| Watch Session | On the frontlines of investigative journalism in cybersecurity: An insider's perspective | Joseph Menn, Author & Investigative Journalist |
| Watch Session | From risk to resilience: Navigating OT security in a converged world | Mary Gannon, GuidePoint Security Patrick Gillespie, GuidePoint Security |
| Watch Session | Force multiplied: Community-powered vuln detection | Rishi Sharma, ProjectDiscovery |
| Watch Session | Mute the sirens: Prioritizing vulnerability noise | Mark Lambert, ArmorCode |
| Watch Session | The network edge: EOL and exploitation | Kimber Duke, VulnCheck Patrick Garrity, VulnCheck |
| Watch Session | Bug bounties in the age of AI | Casey Ellis, Bugcrowd |
| Watch Session | Perimeters and pathways: Protecting the complete attack surface | HD Moore, runZero Jared Atkinson, SpecterOps Zakir Durumeric, Censys |
| Watch Session | The infinite eye: How AI threat intelligence gives defenders an asymmetric edge | HD Moore, runZero Jonathan Cran, Mallory |
Get the latest news and expert insights delivered in your inbox.