Not open for signups yet — join the email waitlist
CVE alerts tuned to your stack — not your anxiety.
Threat Alert watches newly reported CVEs and notifies you only when they match the products you care about and the version range you actually run.
Join the waitlist
Launch notification only. No spam.
Email
Slack
Microsoft Teams
Webhooks
Live rule preview
noise filter
Match criteria
Productnginx
At least1.20.0
Not above1.25.x
Delivery
Slack + Email
high-signal channels
Guardrails
Version aware
avoid unrelated CVEs
When a new CVE drops
You get the alert only if it intersects your rule’s product and version range.
Target the CVEs that matter.
Define alerts by product and set a version floor and ceiling so you don’t get spammed about versions you don’t run.
Product + version range
Alert only when the CVE affects versions you operate today.
Multiple destinations
Email, Slack, Teams, and webhooks — per rule.
No noisy firehose
No 'everything, every version' alerts unless you want them.
Fast to triage
Surface the signal: product, affected range, severity, links.
Example alert rules
You choose the boundaries. Threat Alert only notifies when a new CVE intersects your range.
Product
OpenSSL
Email
At least3.0.0
Not above3.0.x
New CVEs that only affect versions outside this range won’t notify you.
Product
Redis
Slack
At least7.0.0
Not above7.2.x
New CVEs that only affect versions outside this range won’t notify you.
Product
Apache httpd
Webhook
At least2.4.0
Not above2.4.x
New CVEs that only affect versions outside this range won’t notify you.
Get notified when signups open
One email. No spam. When Threat Alert is ready, you’ll be the first to know.
By joining, you agree to receive a single launch notification.
FAQ
What can I filter on?
Product and version range. The goal is high signal alerts tailored to what you run.
Where do alerts go?
Email, Slack, Microsoft Teams, and webhooks — configured per alert rule.
Is this a signup?
Not yet. This is a waitlist for launch notifications only.
