Changelog
Track the latest updates, improvements, and fixes to {P}eelSec.
Save your frequently used filter combinations for one-click access. Color-code your presets for quick identification. Team members can share and reuse filters.
Get notified when your tracked GitHub repos, users, or organizations have new activity. Batched notifications reduce noise while keeping you informed of security tool releases.
IOC extraction now identifies malicious Chrome extension IDs from threat articles. Copy IDs for blocklisting in your browser management tools.
Updated visual design with a new vivid purple accent color across the platform. Improved contrast and accessibility in both light and dark modes.
Settings now available directly in the sidebar for quicker access to account preferences, tech stack configuration, and notification settings.
New dashboard with 12 modular widgets including threat trends, severity breakdown, tech stack matches, recent IOCs, MITRE heatmap, and more. Customize your view with drag-and-drop layout.
Configure your weekly intelligence email with custom sections, severity thresholds, and delivery preferences. Choose what matters most for your Monday briefing.
Reduced aggregation interval from 30 minutes to 15 minutes for faster threat detection. Critical CVEs now appear within minutes of publication.
CVEs in your threat feed now show 'Exploit Available' badges when public PoCs are found on GitHub. One-click links to exploit repositories for faster assessment.
IOC validation now runs in parallel for faster results. Added Shodan integration for IP enrichment alongside VirusTotal and AbuseIPDB.
Add investigation notes to any threat article. Share findings with your team, track response actions, and maintain an audit trail of your analysis.
New dedicated view for exploring threats by MITRE technique. Filter your feed by tactic or technique, see which TTPs are trending in your intel.
Track entire GitHub organizations, not just individual repos. Get notified when security teams like ProjectDiscovery or OWASP release new tools.
Fixed an issue where 'Affects Your Stack' badges wouldn't appear for some matching technologies. Improved matching accuracy for cloud services.
Search your threat feed with boolean operators (AND, OR, NOT), phrase matching, and field-specific queries. Find exactly what you're looking for.
Improved article extraction for better readability. Full-text content now available for 95% of sources, up from 80%.
Protect your account with 2FA using authenticator apps (Google Authenticator, 1Password, Authy). Backup codes available for recovery. Team admins can require 2FA for all members.
Completely redesigned mobile experience. Read threat articles, validate IOCs, and check monitors from your phone with full functionality.
Choose how you receive monitor notifications: immediate emails, daily digest, or weekly summary. Reduce noise while staying informed.
Pre-analyzed intelligence now available for all articles within 5 minutes of aggregation. Previously took up to 15 minutes for some sources.
Export threat data to CSV (for blocklists), JSON (for SIEM), Markdown (for reports), and PDF (for executives). One-click export from any view.
Fixed duplicate articles appearing when the same story was covered by multiple sources. Improved canonical URL detection.
Admins can now see per-member AI usage breakdown. Track costs, token consumption, and analysis counts across your team.
Configure a shared OpenAI API key for your entire team. No more individual key management. Centralized billing and usage tracking.
Redesigned sidebar with collapsible menu and keyboard shortcuts. Quick access to threats, monitors, GitHub tracker, and settings.
Track security repositories, researchers, and organizations. Get notified on new releases, CVE disclosures, and commits to repos you follow.
One-click copy for all extracted IOCs. Copy individual indicators or bulk export for your firewall rules and SIEM.
PeelSec launches with threat feed aggregation, AI-powered analysis, tech stack personalization, smart monitors, and GitHub tracking. Free tier available.
Articles are now automatically mapped to MITRE ATT&CK techniques. See TTPs, defensive recommendations, and related threats at a glance.
Improved false positive detection for IOCs. Better handling of example IPs, documentation domains, and code snippets.
Create keyword-based alerts for threats you care about. Get email notifications when new intel matches your criteria.
Define your tech stack with 120+ technologies across 18 industry sectors. See which threats actually affect your organization.
Every article now includes pre-analyzed intelligence: IOC extraction, executive summaries, threat actors, and malware families identified automatically.
Click any extracted IOC to validate against VirusTotal and AbuseIPDB. See detection rates and abuse reports instantly.
Aggregate CVEs, security news, breach reports, and vendor advisories from 30+ sources into a single timeline.
Full dark mode support across the platform. Automatically matches your system preference or set manually.
Initial beta release of PeelSec with core threat feed aggregation and basic filtering capabilities.