Precursor Intelligence
V2 Beta - Coming Soon

Intelligence.
Reimagined.

The next generation of Precursor Intelligence is being rebuilt from the ground up. Be the first to experience it.

No agents required
Setup in 2 minutes
CREST certified team

Join the Waitlist

Get early access when V2 launches.

By joining you agree to our Privacy Policy. We'll only contact you about V2.

0+

CVEs Tracked

0+

IOCs Indexed

0+

Malware Samples

0+

Threat Groups

01 - Monitor

Know Your Attack Surface.

Continuous, non-invasive monitoring of your entire technology estate. No agents, no scans - just real-time visibility.

Unlimited Technology Tracking

Define and monitor an unlimited number of vendors, libraries, and versions across your entire stack. From Log4j to React to AWS services.

Real-Time Vulnerability Alerts

Receive alerts the moment a vulnerability is disclosed to the NVD or our private threat feeds. Stop waiting for monthly scan reports.

Interactive Dashboard

A fully customisable command centre. Filter by severity, technology, or threat actor. Visualise your risk posture trends over time.

02 - Analyse

Predict. Prioritise. Act.

CVSS scores alone don't cut it. V2 uses AI and behavioural data to tell you what will actually get exploited.

AI-Powered Triage

Gemini AI reads thousands of advisories and generates prioritised action plans with technical remediation steps.

EPSS Scoring

Exploit Prediction Scoring System shows the probability of exploitation in the wild (0-100%). Fix the 2% that are dangerous.

CISA KEV Catalogue

Automatic flagging of any vulnerability listed in CISA's Known Exploited Vulnerabilities catalogue. Government-validated threats.

Threat Intelligence Feeds

Aggregated feeds from multiple sources - threat reports, APT groups, IOCs, malware samples, and blacklists mapped to MITRE ATT&CK.

03 - Defend

Defend in Seconds.

Don't just stare at the problem. V2 gives you the rules, the plans, and the code to fix it - automatically.

Remediation Plans

Step-by-step upgrade paths, workaround configurations, and patch links. Copy-paste protection for your engineering team.

SIGMA Detection Rules

Community-driven detection rules with voting, mapped to MITRE ATT&CK. Export directly into Splunk, Elastic, or Sentinel.

Atomic Red Team Tests

Browse and deploy atomic test cases for adversary simulation. Validate your defences against real-world techniques.

MITRE ATT&CK Navigator

Interactive attack matrix explorer. Every alert mapped to tactics, techniques, and procedures so you understand the adversary's playbook.

Unified Alerting

Three-source notifications - vulnerabilities, brand protection, and SSL - with granular email delivery. Never miss a critical alert.

Weekly Intelligence Reports

Automated 7-day summary of new CVEs, KEV additions, and EPSS score changes. Your Monday morning security briefing, delivered.

04 - Protect

Guard Your Digital Identity.

Monitor your domains, detect lookalike impersonations, and track SSL certificates across your entire estate.

Typosquatting Detection

Discover lookalike domains targeting your brand with registration dates, MX records, and risk scoring.

Domain Intelligence

Track all your domains in one place. DNS changes, WHOIS updates, subdomain discovery, and security posture monitoring.

SSL Certificate Monitoring

Automated expiry alerts with urgency-based colour coding across all your domains. Never miss a renewal.

05 - Attack Surface
EdgeProtect

Map Your Entire Perimeter.

Fully integrated with EdgeProtect, our in-house EASM tool. Launch scans from within the platform and see exactly what attackers see - domains, hosts, services, credentials, and vulnerabilities.

Discover Shadow IT

Find unauthorised services, cloud instances, and infrastructure that exist outside your IT governance.

Network Topology Mapping

Automatically map your network, enumerate hosts, IP ranges, DNS records, and visualise how your infrastructure connects.

Port & Service Enumeration

Scan for open ports and running services across your estate. Identify exposed databases, admin panels, and legacy protocols.

Exposed Credentials Detection

Scan for leaked API keys, passwords, and credentials across your public-facing services and repositories.

Vulnerability Scanning

Detect vulnerabilities across your external perimeter. Results feed directly into your main dashboard for unified triage.

SSL & Certificate Analysis

Enumerate and audit all SSL certificates across your estate. Detect weak ciphers, expiring certs, and misconfigurations.

Premium Services

Beyond software. Human expertise.

Seamlessly escalate findings to CREST-certified Precursor Security professionals. Penetration testing, managed SOC, and incident response - all from one platform.

Precursor

Be first in line.

V2 is almost here. Secure your spot now and get early access before general availability.

Join the Waitlist

© 2026 Precursor Intelligence Ltd. All rights reserved. ·Privacy Policy·Terms