CyberForce Awakens
Unified security intelligence — threat feeds, compliance automation, VAPT orchestration, and knowledge for modern defenders.
Suraksha Path
Cyber & InfoSec Career Navigator — 6 paths, 4 levels, INR salaries, certs & top courses
CyberForce AI
Expert cybersecurity AI agent — threat analysis, pentest, IR, GRC, cloud security & India compliance
Nine-module vulnerability intelligence engine — DNS recon, CT log enumeration, TLS inspection, WAF/CDN/LB fingerprinting, IP intel, VirusTotal, Google Safe Browsing and AI — unified in one platform.
DNS Recon
A · MX · TXT · SPF · DMARC
CT Log Enum
Subdomain discovery via crt.sh
WAF · CDN · LB
Infrastructure fingerprinting
TLS Inspector
Cert chain · cipher · grade
AI Analysis
CVSS scoring + remediation scripts
India Compliance
CERT-In · DPDP · RBI · ISO 27001
Active Scanner
Spider + payload injection · OWASP Top 10
VirusTotal
Multi-engine reputation check
Distributed Audit Architecture: CIS · NIST · DPDP · ISO · NIST CSF 2.0
APT-29 spearphishing campaign targeting financial sector
CVE-2026-1017 — RCE in Chrome renderer (CVSS 9.0)
LockBit 4.0 variant targeting healthcare infrastructure
Supply-chain compromise in popular npm packages
Mass exploitation of Ivanti Connect Secure flaw
DPDPA 2023 enforcement notices issued by MEITY
Prompt injection bypass in GPT-4o vision models
NIST updates SP 800-53 Rev.6 control catalog
Industry-wide findings · OWASP · NIST · CERT-In aligned
Platform Intelligence Modules
Trishul Compliance
CIS · DPDP · NIST multi-agent audit
CVE Intelligence
CVSS · EPSS · KEV vulnerability DB
Threat Intelligence
Live feeds · APT tracking · IoCs
OWASP Interactive
Top 10 · API · LLM risk explorer
Red Team Ops
MITRE ATT&CK TTP mapping
Digital Forensics
DFIR workflows · evidence chains
Security Frameworks
SOC2 · PCI-DSS · HIPAA · GDPR
AI Security
LLM risks · MITRE ATLAS · AI RMF
Bug Bounty Hub
Programs · writeups · hunters
Penetration Testing
Methodology · tools · reports
Cloud Security
K8s · containers · IaC hardening
Live Threat Map
Global real-time attack telemetry
Knowledge Architecture
SIVS — Standardised Information & Vulnerability Score
Risk ScoringSIVS — Standardised Information & Vulnerability Score (0–10)
Composite Vulnerability
Risk Scoring Engine
SIVS is a composite vulnerability risk score (0–10) that combines CVSS base severity, EPSS exploit probability, and KEV active-exploitation status into a single prioritisation metric. It helps security teams cut through alert noise and focus remediation effort where exposure is highest.
[SIVS] :: Scoring Engine Active
[CVSS] :: Base Score Loaded ✓
[EPSS] :: Exploit Probability: 0.87
[KEV] :: Active Exploitation: YES
─────────────────────
SIVS Score: 9.4 / 10
Priority: CRITICAL
Action: Patch Immediately
Risk Score
Composite 0–10 score combining CVSS, EPSS & KEV factors
Severity Bands
Critical · High · Medium · Low classification with context
Exploit Probability
EPSS-weighted likelihood of exploitation within 30 days
Threat Context
KEV status, active campaigns, and in-the-wild usage signals
Remediation Priority
Business impact + asset exposure = patch queue ordering
Compliance Mapping
Aligns with CERT-In advisories, DPDPA, and VAPT scope
Data fiduciary duties, consent framework, ₹250Cr penalty regime
Annex A migrated to 93 controls — SoA refresh mandatory 2026
Prompt injection, supply chain, model theft — map to ML-SEC controls
Govern · Map · Measure · Manage — aligns ISO 42001