Getting Started

Welcome to Mallory, a threat intelligence platform designed to help you stay ahead of emerging cybersecurity threats. Mallory is still in its early stages, but it already offers valuable features to support your threat intelligence needs. More capabilities are on the way!

What to Expect

At this stage, Mallory provides the following core features:

  • Current Events – A curated summary of the latest threats and vulnerabilities sourced from open intelligence.

  • Malware Family Intelligence - An encylopedia of known malware families and the circumstances of their discovery and usage.

  • Threat Actor Intelligence – An encyclopedia of known threat actors, their tactics, and related intelligence.

  • Vulnerability Intelligence – An encyclopedia of known vulnerabilities, including key insights and analysis.

We are actively developing additional features to enhance Mallory’s capabilities, so stay tuned for updates!

Understanding Key Concepts

To make the most of Mallory, it's helpful to understand the core concepts that power its intelligence capabilities. You can explore these in detail on the Concepts Page, but here’s a brief overview:

Foundational Concepts – Mallory ingests and processes Open Source Intelligence (OSINT) at scale, transforming vast amounts of publicly available information into actionable insights.

  • Sources – Data is collected from a variety of sources.

  • References - Each reference corresponds to a URL containing relevant intelligence.

  • Content Chunks - References have 1 or more content chunks, automatically analyzed for deeper context and insights about the entities discussed in the content

  • Entities – Entities such as malware, ransomware, threat actors, vulnerabilities, and organizations are identified within the data, continuously updated with the latest infomration

  • Mentions - Mentions tie Entities to References that mention them..

Next Steps

Now that you’re familiar with Mallory’s concepts at a highlevel , here’s what you can do next:

  • Gain a deeper understanding of how Mallory operates under the hood in the Concepts section.

  • Check Current Events – Get the latest threat intelligence updates.

  • Browse the Intelligence – Search for entities relevant to your needs.

Last updated