Unprecedented visibility into the vulnerability ecosystem from the eye of the storm. Prioritize response. Finish taking action before the attacks occur.
The cyber threat landscape has changed.
In 2020, attackers needed 1.6 years to weaponize a known vulnerability.
By 2025, that window has collapsed to just 21 days.
VulnCheck Platform
Exploit Intelligence for Vulnerability Prioritization
Exploit & Vulnerability Intelligence
Early access to new vulnerability information not found in the NVD along with dozens of unique fields.
Initial Access Intelligence
In-house developed exploit PoCs, packet captures, and Suricata signatures to defend against initial access vulnerabilities.
IP Intelligence
Detection of potentially vulnerable systems, attacker command & control (C2) infrastructure, and honeypots.
Canary Intelligence
Data from globally deployed Internet sensors revealing the first signs of vulnerability exploitation.
BACK FOR YEAR TWO
A MOVEMENT TO COUNTER EMERGING THREATS
Year one proved the need. Year two raises the bar. Join the leaders defining how we counter emerging threats.
Keynote Speaker
THREATCON1 welcomes Gen. Paul M. Nakasone Former Commander, U.S. Cyber Command & Former Director of the National Security Agency. A recognized authority on cyber operations and national security, General Nakasone continues to advance dialogue and research on emerging global security challenges, inspiring innovation and leadership in this critical field.
Capture the Flag
Powered by Skillbit, the THREATCON1 CTF challenges participants with a mix of trivia, PCAP analysis, reverse engineering, and exploitation tasks. Teams are welcome, so bring your crew or join up with others on-site. Prizes will be awarded to the top performers.
Regional Events
THREATCON1 is hitting the road. Join us for an evening of drinks, conversation, and connections with cyber threat response leaders in London on June 3 and Las Vegas on August 5. These evenings are where the real conversations happen: informal, unfiltered, and among the people shaping how we defend what matters most.
In 2025, barely 1% of disclosed vulnerabilities were exploited in the wild. Yet those that were exploited were operationalized quickly, attracted diverse threat actors, and often caused outsized damage before organizations had a chance to respond. This report identifies which vulnerabilities mattered, why attackers targeted them, and where timing failures left organizations exposed.
Ready to get Started?
Explore VulnCheck, a next-generation Cyber Threat Intelligence platform, which provides exploit and vulnerability intelligence to help you prioritize and remediate vulnerabilities that matter.
Vulnerability Prioritization
Prioritize vulnerabilities that matter based on the threat landscape and defer vulnerabilities that don't.
Early Warning System
Real-time alerting of changes in the vulnerability landscape so that you can take action before the attacks start.