HomeIntelligenceBrief
BREACH BRIEF⚪ Informational ThreatIntel

Securonix ThreatQ Integrates Criminal IP Threat Intelligence to Boost Third‑Party Risk Visibility

Securonix’s ThreatQ now pulls real‑time exposure data from Criminal IP, enriching IP indicators with maliciousness scores, VPN/proxy detection and vulnerability context. The partnership gives security teams deeper insight into third‑party asset exposure without workflow disruption, a key advantage for TPRM programs.

LiveThreat™ Intelligence · 📅 May 01, 2026· 📰 bleepingcomputer.com
Severity
Informational
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
bleepingcomputer.com

Securonix ThreatQ Integrates Criminal IP Threat Intelligence to Boost Third‑Party Risk Visibility

What Happened – Securonix announced that its ThreatQ platform now natively ingests Criminal IP’s exposure‑based threat intelligence via API. The integration enriches every IP indicator with real‑time maliciousness scores, VPN/proxy detection, open‑port data and known vulnerabilities, all without changing existing analyst workflows.

Why It Matters for TPRM

  • Provides continuous, external visibility into how a vendor’s assets are exposed on the public Internet.
  • Enables automated risk scoring that can be fed into third‑party risk dashboards, reducing manual effort.
  • Enhances incident response speed, limiting potential supply‑chain impact from compromised third‑party infrastructure.

Who Is Affected – Organizations that use ThreatQ (primarily large enterprises, MSSPs, and security‑focused SaaS providers) across all industries; especially those with extensive third‑party ecosystems.

Recommended Actions

  • Review your current ThreatQ or SIEM integrations to confirm the Criminal IP feed is enabled.
  • Map the new exposure data to your vendor risk scoring model and adjust thresholds if needed.
  • Validate that the API keys and access controls for the Criminal IP service follow your zero‑trust policies.

Technical Notes – The integration leverages Criminal IP’s RESTful APIs to pull exposure data (maliciousness score, VPN/proxy status, open ports, CVE references) and automatically enriches ThreatQ’s indicator graph. No new CVEs are introduced; the value is purely contextual enrichment. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/criminal-ip-and-securonix-threatq-collaborate-to-enhance-threat-intelligence-operations/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.