ThreatForce: How NopSec Aggregates 80+ Intelligence Sources to Cut Through the Noise
- Jan 13, 2026
- Michelangelo Sidagni
A celebrity vulnerability hits the news—CVSS 10.0, wall-to-wall coverage. Your team drops everything to patch it, but it doesn’t affect your particular environment. Meanwhile, a CVSS 6.6 sits in the backlog. No headlines, but it’s the one actively being weaponized against you.
That’s the gap between chasing scores and understanding threats. Most vulnerability management programs have the data. They don’t have the context.
ThreatForce exists to close that gap.
ThreatForce is NopSec’s threat intelligence aggregation engine. It’s a dedicated system that continuously collects, correlates, and analyzes vulnerability data from more than 80 sources—both open source and commercial—to deliver context your scanner simply can’t provide.
This isn’t just about gathering data. ThreatForce is where our AI and machine learning models run, determining which vulnerabilities carry real-world risk and which ones are just noise.
ThreatForce pulls from a deliberately broad range of sources:
Government and Industry Authorities such as:
Threat Intelligence Vendors such as:
Exploit and Vulnerability Databases
Security Research and Advisories
Vulnerability Aggregators
Our 80+ sources accounts for aggregators that themselves pull from multiple upstream feeds—giving ThreatForce substantially broader coverage than any single intelligence subscription could provide.
Raw threat data is just the beginning. ThreatForce correlates this information and uses it to train our AI risk model, which considers factors including:
Exploit Availability and Maturity: Is there a working exploit? Is it proof-of-concept or fully weaponized? Is it in Metasploit?
Active Exploitation: Is CISA tracking this as actively exploited? What does EPSS (Exploit Prediction Scoring System) say about likelihood?
Malware and Ransomware Associations: Has this vulnerability been linked to malware campaigns or ransomware operations?
Attack Path Relevance: We use LLM correlation against the MITRE ATT&CK framework to understand how a vulnerability fits into real-world attack chains.
Celebrity Vulnerability Status: Is this getting media attention that might put your organization under scrutiny—or is it hype without substance?
The result is the NopSec Risk Score, which can both increase priority for vulnerabilities with genuine exploitation activity and—critically—decrease priority for theoretical risks that aren’t actually being exploited. A CVSS 10.0 with no active exploits might drop significantly. A CVSS 6.6 linked to active malware campaigns might jump to urgent.
Here’s what the data shows: in NopSec’s 2020 State of Vulnerability Risk Management report, filtering 10 million vulnerabilities through threat-based prioritization reduced the number representing active or potential threats to around 1 million. The truly urgent ones? Roughly 19,000.
That’s the difference between drowning in data and knowing what to fix first.
Organizations using ThreatForce-powered prioritization have seen mean time to remediation drop by more than 80%. Security teams stop chasing headlines and start following a rational, defensible patching strategy.
CVSS tells you theoretical severity. ThreatForce tells you real-world risk.
When your scanner outputs a sea of red, ThreatForce is how NopSec cuts through to show you the 10 things that actually matter—informed by 80+ intelligence sources, correlated through machine learning, and delivered as actionable priorities.
Because fixing less while securing more isn’t just a tagline. It’s what happens when threat intelligence actually works.