Skip to content

Threat Intelligence

Segment at a Glance

Market Size: ~$11.6 billion (2025) | projected ~$23.0 billion by 2030 (MarketsandMarkets) | ~14.7% CAGR Maturity: Growth --- consolidation accelerating via M&A (Mastercard/Recorded Future $2.65B, Dataminr/ThreatConnect $290M) Growth: High --- driven by ransomware surge, nation-state threats, regulatory pressure, and AI-powered analysis Key Trend: Shift from reactive IOC feeds to AI-driven, operationalized intelligence that informs strategic business decisions

What It Is

Threat intelligence (TI) is the evidence-based knowledge --- including context, mechanisms, indicators, implications, and actionable advice --- about existing or emerging threats to assets. The category spans a continuum from raw data feeds to finished intelligence products:

  • Threat Intelligence Platforms (TIPs): Software that aggregates, correlates, enriches, and operationalizes threat data from multiple sources. TIPs ingest indicators of compromise (IOCs), map them to adversary tactics (MITRE ATT&CK), and push actionable intelligence to defensive tools (SIEM, SOAR, firewall, EDR). Key platforms include Recorded Future, Anomali ThreatStream, ThreatConnect, and MISP.
  • Dark Web Monitoring: Specialized collection and analysis of data from dark web forums, illicit marketplaces, encrypted chat channels (Telegram, Discord), and paste sites. Identifies stolen credentials, leaked data, pre-attack chatter, and threat actor infrastructure. Market estimated at ~$1.2--2.5 billion in 2024--2025 (The Business Research Company).
  • Threat Intel Feeds: Machine-readable streams of IOCs (IP addresses, domains, file hashes, URLs) distributed via STIX/TAXII, API, or proprietary formats. Range from free community feeds (Abuse.ch, AlienVault OTX) to premium commercial feeds ($50K--$500K+/year).
  • Finished Intelligence / Advisory Services: Human-authored reports on threat actors, campaigns, vulnerabilities, and geopolitical risks. Mandiant (Google), CrowdStrike, and Intel 471 are known for deep adversary-focused reporting.
  • Digital Risk Protection Services (DRPS): Monitoring for brand impersonation, executive targeting, data leaks, and fraudulent domains across the surface, deep, and dark web. ZeroFox and Flashpoint are prominent players.
CollectionProcessingConsumptionOSINT\n(Surface Web) Dark Web\nForums & Markets Technical Sources\n(Honeypots, Sinkholes) HUMINT\n(Adversary Engagement) Threat Intelligence\nPlatform (TIP) Enrichment &\nCorrelation MITRE ATT&CK\nMapping SIEM / XDRSOAR PlaybooksFirewall / EDR\nBlock Lists Analyst Reports\n& Briefings

Buyer Profile

Attribute Detail
Primary Buyer CISO, VP of Security Operations, Director of Threat Intelligence
Influencers SOC analysts, incident response teams, threat hunters, risk officers, CTI analysts
Org Size Mid-market to enterprise (1,000+ employees); SMBs typically consume TI through MSSP/MDR providers
Buying Triggers Post-breach lessons learned, ransomware incident, regulatory audit (DORA, SEC disclosure rules), board-level risk visibility demand, MSSP contract renewal
Budget Range 76% of enterprises spend $250K+/year on external TI; 14% spend over $1M/year (Recorded Future 2025 State of TI Report)
Sales Cycle 3--9 months (enterprise TIP); 1--3 months (feed subscriptions, DRPS)

Market Landscape

Vendor Positioning

{
  "$schema": "https://vega.github.io/schema/vega-lite/v5.json",
  "description": "Threat Intelligence Vendor Positioning (2025)",
  "width": 500,
  "height": 400,
  "title": {
    "text": "Threat Intelligence Vendor Positioning (2025)",
    "fontSize": 16,
    "color": "#1B1F3B"
  },
  "config": {
    "background": "transparent",
    "axis": {
      "labelColor": "#3D4166",
      "titleColor": "#1B1F3B",
      "gridColor": "#e5e8ee"
    },
    "text": {
      "color": "#1B1F3B"
    }
  },
  "layer": [
    {
      "mark": {
        "type": "text",
        "fontSize": 13,
        "fontWeight": "bold",
        "opacity": 0.15
      },
      "data": {
        "values": [
          {
            "x": 0.75,
            "y": 0.75,
            "label": "Leaders"
          },
          {
            "x": 0.25,
            "y": 0.75,
            "label": "Platform Players"
          },
          {
            "x": 0.25,
            "y": 0.25,
            "label": "Emerging"
          },
          {
            "x": 0.75,
            "y": 0.25,
            "label": "Specialists"
          }
        ]
      },
      "encoding": {
        "x": {
          "field": "x",
          "type": "quantitative"
        },
        "y": {
          "field": "y",
          "type": "quantitative"
        },
        "text": {
          "field": "label",
          "type": "nominal"
        },
        "color": {
          "value": "#1B1F3B"
        }
      }
    },
    {
      "mark": {
        "type": "point",
        "size": 150,
        "filled": true
      },
      "data": {
        "values": [
          {
            "x": 0.78,
            "y": 0.95,
            "label": "Recorded Future (Mastercard)"
          },
          {
            "x": 0.82,
            "y": 0.92,
            "label": "Mandiant (Google)"
          },
          {
            "x": 0.75,
            "y": 0.88,
            "label": "CrowdStrike Falcon Intel"
          },
          {
            "x": 0.85,
            "y": 0.85,
            "label": "Microsoft Defender TI"
          },
          {
            "x": 0.45,
            "y": 0.75,
            "label": "Flashpoint"
          },
          {
            "x": 0.3,
            "y": 0.72,
            "label": "Intel 471"
          },
          {
            "x": 0.6,
            "y": 0.65,
            "label": "Anomali"
          },
          {
            "x": 0.55,
            "y": 0.62,
            "label": "ThreatConnect (Dataminr)"
          },
          {
            "x": 0.4,
            "y": 0.55,
            "label": "ZeroFox"
          },
          {
            "x": 0.35,
            "y": 0.4,
            "label": "Sekoia.io"
          },
          {
            "x": 0.5,
            "y": 0.35,
            "label": "OpenCTI (Filigran)"
          },
          {
            "x": 0.25,
            "y": 0.3,
            "label": "Flare"
          }
        ]
      },
      "encoding": {
        "x": {
          "field": "x",
          "type": "quantitative",
          "scale": {
            "domain": [
              0,
              1
            ]
          },
          "axis": {
            "title": "Niche / Specialist \u2192 Platform Breadth",
            "format": ".0%"
          }
        },
        "y": {
          "field": "y",
          "type": "quantitative",
          "scale": {
            "domain": [
              0,
              1
            ]
          },
          "axis": {
            "title": "Emerging \u2192 Established",
            "format": ".0%"
          }
        },
        "color": {
          "value": "#00C9A0"
        },
        "tooltip": [
          {
            "field": "label",
            "type": "nominal",
            "title": "Vendor"
          },
          {
            "field": "x",
            "type": "quantitative",
            "title": "Platform Breadth"
          },
          {
            "field": "y",
            "type": "quantitative",
            "title": "Established"
          }
        ]
      }
    },
    {
      "mark": {
        "type": "text",
        "dy": -12,
        "fontSize": 11
      },
      "data": {
        "values": [
          {
            "x": 0.78,
            "y": 0.95,
            "label": "Recorded Future (Mastercard)"
          },
          {
            "x": 0.82,
            "y": 0.92,
            "label": "Mandiant (Google)"
          },
          {
            "x": 0.75,
            "y": 0.88,
            "label": "CrowdStrike Falcon Intel"
          },
          {
            "x": 0.85,
            "y": 0.85,
            "label": "Microsoft Defender TI"
          },
          {
            "x": 0.45,
            "y": 0.75,
            "label": "Flashpoint"
          },
          {
            "x": 0.3,
            "y": 0.72,
            "label": "Intel 471"
          },
          {
            "x": 0.6,
            "y": 0.65,
            "label": "Anomali"
          },
          {
            "x": 0.55,
            "y": 0.62,
            "label": "ThreatConnect (Dataminr)"
          },
          {
            "x": 0.4,
            "y": 0.55,
            "label": "ZeroFox"
          },
          {
            "x": 0.35,
            "y": 0.4,
            "label": "Sekoia.io"
          },
          {
            "x": 0.5,
            "y": 0.35,
            "label": "OpenCTI (Filigran)"
          },
          {
            "x": 0.25,
            "y": 0.3,
            "label": "Flare"
          }
        ]
      },
      "encoding": {
        "x": {
          "field": "x",
          "type": "quantitative"
        },
        "y": {
          "field": "y",
          "type": "quantitative"
        },
        "text": {
          "field": "label",
          "type": "nominal"
        },
        "color": {
          "value": "#3D4166"
        }
      }
    },
    {
      "mark": {
        "type": "rule",
        "strokeDash": [
          4,
          4
        ],
        "color": "#6B6F8D"
      },
      "data": {
        "values": [
          {
            "x": 0.5
          }
        ]
      },
      "encoding": {
        "x": {
          "field": "x",
          "type": "quantitative"
        }
      }
    },
    {
      "mark": {
        "type": "rule",
        "strokeDash": [
          4,
          4
        ],
        "color": "#6B6F8D"
      },
      "data": {
        "values": [
          {
            "y": 0.5
          }
        ]
      },
      "encoding": {
        "y": {
          "field": "y",
          "type": "quantitative"
        }
      }
    }
  ]
}

Key Vendors

Vendor Strengths Weaknesses Notable
Recorded Future (Mastercard) World's largest TI company; 1,900+ clients across 75 countries; Intelligence Cloud indexes open web, dark web, and technical sources; AI-driven analysis; strong government presence (45 countries) Premium pricing; now owned by Mastercard --- strategic direction may shift toward financial services; integration complexity for smaller orgs Acquired by Mastercard for $2.65B (Dec 2024); >50% of Fortune 100 as clients (Mastercard)
Mandiant / Google Threat Intelligence Deep adversary research (APT tracking heritage); integration with Google SecOps, VirusTotal, and Gemini AI; agentic TI platform launched 2025; strong IR consulting arm Tied to Google Cloud ecosystem; premium pricing; Mandiant brand being subsumed into Google TI branding Agentic TI platform uses specialized AI agents to pull from OSINT, dark web, Mandiant reports, and VirusTotal data (Google Cloud)
CrowdStrike Falcon Intelligence Tight integration with Falcon endpoint/XDR platform; adversary-focused (130+ tracked threat groups); automated IOC blocking via Falcon sensors Best value when already in CrowdStrike ecosystem; standalone TI less competitive; limited dark web depth vs. specialists Falcon Intelligence feeds directly into EDR for automated prevention
Flashpoint Business risk intelligence beyond cyber (corporate fraud, insider risk, geopolitical); primary source collection from dark web forums and illicit markets; physical + cyber threat convergence Narrower platform breadth; less automation than TIP-focused competitors; UI complexity reported by users Strong in financial services and government verticals (Flashpoint)
Intel 471 Deep HUMINT-driven cybercriminal underground monitoring; TITAN platform with automated + human collection from closed forums; strong in banking, finance, e-commerce Narrow focus on criminal underground (less coverage of nation-state or geopolitical threats); smaller scale than Recorded Future Niche leader for dark web adversary tracking; emphasis on human intelligence collectors (Intel 471)
Anomali ThreatStream aggregates 200+ intelligence sources; "world's largest curated TI repository"; marketplace model for feed management; strong SOC integration Platform can feel overwhelming; integration setup complexity; less original research than Mandiant/Recorded Future Focus on SOC efficiency and large-scale feed aggregation
ThreatConnect (Dataminr) Pioneer in TI operationalization (TI Ops); unique cyber risk quantification in financial terms; strong workflow automation Being acquired by Dataminr ($290M, Oct 2025) --- transition uncertainty; smaller market share than leaders Trusted by 4 of 5 largest tech companies; government agencies in US, UK, Australia (Dataminr)
ZeroFox External threat visibility (brand protection, social media, dark web); consolidated DRPS platform; strong in executive protection Less depth in traditional TI (IOC feeds, adversary research); narrower use case than full TIP Acquired Haveli Investments (2024); strong DRPS positioning
Microsoft Defender Threat Intelligence Bundled with Microsoft security stack; massive telemetry from billions of signals; integrated with Sentinel and Defender XDR Best within Microsoft ecosystem; less independent research depth; limited dark web coverage vs. specialists Near-zero marginal cost for E5 customers

Competitive Dynamics

Consolidation is reshaping the market. The two largest TI deals in history --- Mastercard's $2.65B acquisition of Recorded Future (Dec 2024) and Dataminr's $290M acquisition of ThreatConnect (Oct 2025) --- signal that standalone TI companies are being absorbed into larger platforms. Bitsight's acquisition of Cybersixgill further consolidates dark web analytics into broader risk management.

Platform players are embedding TI natively. CrowdStrike, Microsoft, Palo Alto Networks, and Google are embedding threat intelligence directly into their security platforms, reducing the need for standalone TIP purchases. This "TI-as-a-feature" trend pressures pure-play vendors.

83% of organizations now run full-time TI teams (Recorded Future 2025 State of TI Report), up significantly from prior years, indicating that TI has matured from a nice-to-have to a core security function.

AI is the primary differentiator. Google's agentic TI platform, Recorded Future's AI-driven Intelligence Cloud, and Anomali's AI-powered enrichment all position AI as the key to scaling intelligence operations beyond what human analysts can process.

Recent M&A and Funding

Date Deal Details
Oct 2025 Dataminr acquires ThreatConnect $290M; combines real-time public data AI with internal threat intelligence operations; creates "agentic AI-powered client-tailored intelligence" (SecurityWeek)
Dec 2024 Mastercard acquires Recorded Future $2.65B; world's largest TI acquisition; adds AI-driven TI to Mastercard's fraud prevention and cybersecurity services (Mastercard)
2024 Bitsight acquires Cybersixgill Expands Bitsight's dark web analytics capabilities for third-party risk management (CSO Online)
2024 ZeroFox / Haveli Investments ZeroFox taken private by Haveli Investments; restructuring to focus on external threat intelligence
Sep 2024 Google acquires Mandiant (integration) Full integration of Mandiant TI, VirusTotal, and Gemini AI into unified Google Threat Intelligence platform (Google Cloud)

Knowledge Gap

Anomali's funding status and current valuation are not well-documented in public sources post-2022. Flashpoint's latest funding round details are similarly limited. Intel 471's ownership structure (Insight Partners-backed) has not been updated publicly since 2021.

Pricing Models

Model Typical Range Used By
Platform subscription (enterprise) $100K--$500K+/year Recorded Future, Anomali ThreatStream, ThreatConnect
Feed subscription $50K--$250K/year Commercial IOC feeds, dark web monitoring
Bundled with platform Included in E5/XDR licensing Microsoft Defender TI, CrowdStrike Falcon Intel
Per-module pricing $25K--$150K/module/year Flashpoint, Intel 471 (by collection domain)
DRPS / brand protection $30K--$200K/year ZeroFox, Flashpoint, Recorded Future
Free / open-source $0 (+ ops cost) MISP, OpenCTI, Abuse.ch, AlienVault OTX

Knowledge Gap

Exact per-seat or per-module pricing for Recorded Future (post-Mastercard acquisition), Intel 471, and Flashpoint is not publicly disclosed. The ranges above are estimated from practitioner reports, vendor comparison sites, and Gartner Peer Insights reviews.

TCO friction points:

  • Feed sprawl: Organizations often subscribe to 5--15 intelligence feeds but lack the tooling or staff to operationalize them. Paying for data that never reaches a blocking rule or analyst dashboard is a common waste.
  • Analyst cost: A senior CTI analyst commands $120K--$180K+ in the US; building a 3--5 person TI team represents a $500K--$1M+ annual labor investment on top of tooling costs.
  • Integration engineering: Connecting TIP outputs to SIEM, SOAR, firewall, and EDR systems requires custom API work, STIX/TAXII configuration, and ongoing maintenance.
  • ROI justification: 48% of organizations cite difficulty proving the value of TI investments to leadership (Recorded Future).

Integration & Ecosystem

Threat intelligence sits at the center of the security operations ecosystem, feeding context into nearly every defensive tool:

  • SIEM/XDR integration: TIPs push IOCs and threat context into SIEM platforms (Splunk, Microsoft Sentinel, Google SecOps) for automated alert enrichment and correlation. High-confidence indicators trigger automated blocking.
  • SOAR playbooks: Intelligence-driven playbooks automate enrichment (hash lookup, domain reputation, WHOIS), triage (confidence scoring), and response (block IP, quarantine endpoint, notify analyst).
  • Firewall/EDR block lists: Automated IOC feeds update firewall deny lists, DNS sinkholes, and EDR prevention policies. CrowdStrike's tight TI-to-EDR pipeline is the gold standard.
  • Vulnerability management: TI identifies which CVEs are being actively exploited in the wild, enabling risk-based prioritization (e.g., CISA KEV catalog integration).
  • Risk and compliance: TI informs third-party risk assessments, regulatory reporting (SEC incident disclosure), and board-level risk dashboards.
  • Identity security: Credential leak monitoring from dark web feeds triggers password resets and MFA enforcement via identity platforms (Entra ID, Okta).
Threat Intelligence\nPlatform SIEM / XDRSOARFirewall / EDR\n/ DNS Vulnerability\nManagement GRC / Board\nDashboards Identity Security\n(Entra, Okta) Threat Hunting\n& Red Team SOC Analysts IOCs & ContextAutomated PlaybooksBlock ListsExploited CVEsRisk ScoringLeaked CredentialsATT&CK MappingAlert EnrichmentAuto-Response

MITRE ATT&CK as Intelligence Framework

MITRE ATT&CK has become the de facto standard taxonomy for threat intelligence, providing a structured knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world observations.

How organizations use ATT&CK for threat intelligence:

  • Coverage analysis: Mapping existing detection rules and security controls to ATT&CK techniques to identify defensive gaps. This is typically the entry point for ATT&CK adoption.
  • Threat actor profiling: Associating observed adversary behavior with known ATT&CK techniques to attribute attacks and predict future behavior. TIPs like Recorded Future, Mandiant, and MISP support native ATT&CK mapping.
  • Detection engineering: Writing detection rules (Sigma, SIEM correlation) tied to specific ATT&CK techniques rather than individual IOCs, resulting in more durable detections that survive indicator rotation.
  • Red team/purple team planning: Using ATT&CK-based adversary emulation plans (e.g., APT29 emulation from MITRE Engenuity) to test defenses against realistic attack chains.
  • Executive reporting: Presenting security posture in terms of ATT&CK technique coverage provides a standardized, vendor-neutral framework that resonates with boards and auditors.
ATT&CK Intelligence LifecycleCollect\nRaw threat data Map to ATT&CK\nTactics & Techniques Analyze\nCoverage gaps Prioritize\nDetection rules Detect\nTechnique-based alerts Hunt\nHypothesis-driven

ATT&CK Adoption Maturity

Most organizations begin ATT&CK adoption with coverage analysis and detection engineering. Mature programs progress to threat-informed defense, simulation planning (adversary emulation), and metrics-driven decision-making. The MITRE Center for Threat-Informed Defense (CTID) publishes open-source tools and methodologies to accelerate this progression (MITRE CTID).

Related: Threat Actors Deep-Dives

For exhaustive analysis of the threat actors that drive demand for threat intelligence products, see the Threat Actors section — including nation-state groups, ransomware ecosystem, cybercrime markets, and initial access brokers.

SWOT Analysis

Strengths

  • Threat intelligence directly reduces mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) by providing proactive adversary context
  • 83% of organizations now maintain full-time TI teams, indicating mainstream adoption and budget commitment
  • AI and LLM integration is dramatically accelerating analysis speed --- Google's agentic TI platform and Recorded Future's AI-driven enrichment represent the state of the art
  • MITRE ATT&CK provides a universal taxonomy that enables consistent threat mapping across tools and teams

Weaknesses

  • Signal-to-noise ratio remains the #1 practitioner complaint --- organizations drown in IOC volume but struggle to extract actionable intelligence
  • 48% of organizations cite poor integration with existing security tools as a top pain point
  • Only 49% of enterprises consider their TI maturity "advanced" despite significant investment
  • Talent gap: experienced CTI analysts are scarce and expensive ($120K--$180K+ US salary)

Opportunities

  • AI-driven analysis at scale: LLMs can process, summarize, and correlate threat reports orders of magnitude faster than human analysts --- early adopters report 60--80% reduction in manual triage time
  • TI for strategic decision-making: 43% of security leaders now use TI for strategic business planning, not just SOC operations --- the C-suite audience is growing
  • SMB/mid-market democratization: AI-powered TI tools and managed TI services can bring enterprise-grade intelligence to organizations that cannot afford dedicated CTI teams
  • OT/ICS threat intelligence: Industrial threat intelligence is a nascent sub-segment with few specialized providers (Dragos, Claroty) and growing demand
  • Threat intelligence as a service (TIaaS): MSSPs and MDR providers are embedding TI into managed offerings, expanding the addressable market

Threats

  • Platform consolidation: CrowdStrike, Microsoft, Google, and Palo Alto embedding TI natively reduces demand for standalone TIPs
  • Mastercard's acquisition of Recorded Future may redirect the company's focus toward financial services, potentially underserving other verticals
  • Adversaries are using AI to generate threats faster than defenders can process intelligence --- the "just-in-time" AI malware trend (PROMPTFLUX, PROMPTSTEAL) creates intelligence that expires within hours
  • Free and open-source alternatives (MISP, OpenCTI) are increasingly capable, compressing the low end of the commercial market
  • Intelligence sharing friction: organizations remain reluctant to share threat data due to liability, competitive, and classification concerns

Pain Points & Complaints

Common Complaints

Sourced from Gartner Peer Insights, Recorded Future 2025 State of TI Report, and practitioner forums.

Signal vs. noise --- the defining complaint:

  • Organizations receive thousands of IOCs daily from multiple feeds, but the vast majority are stale, irrelevant, or low-confidence. Practitioners describe TI feeds as "drinking from a fire hose" with no easy way to filter what matters to their specific environment.
  • SOC teams report that >50% of TI-generated alerts are false positives, contributing to the broader alert fatigue problem --- 76% of SOC leaders rank alert overload as their top challenge (Dropzone AI).
  • IOC decay is a persistent issue: IP addresses and domains used in attacks are frequently recycled by legitimate services within days, but remain on block lists for months, causing false positives and service disruptions.

Integration difficulty:

  • 48% of organizations cite poor integration with existing security tools as a top pain point (Recorded Future). Connecting a TIP to SIEM, SOAR, EDR, and firewall systems requires custom API work, STIX/TAXII configuration, and ongoing maintenance.
  • Many organizations buy TI platforms but never fully integrate them, resulting in "shelfware" --- expensive subscriptions that produce reports nobody reads.
  • STIX/TAXII interoperability remains inconsistent across vendors despite being the industry standard. Version mismatches (STIX 1.x vs. 2.x vs. 2.1) and proprietary extensions create friction.

ROI justification:

  • CISOs struggle to quantify the value of threat intelligence to boards and CFOs. "We prevented attacks that never happened" is a difficult narrative to sell.
  • 91% of organizations plan to increase TI spending in 2026, yet only 49% consider their programs mature --- suggesting significant investment without proportional capability improvement.
  • ThreatConnect's unique capability of quantifying cyber risk in financial terms was a key differentiator precisely because most TIPs cannot translate intelligence into dollar-denominated risk.

Stakeholder communication:

  • Translating technical threat intelligence into business-relevant briefings for executives, board members, and non-technical stakeholders remains one of the most fundamental challenges for TI teams. A report about "APT29 leveraging CVE-2024-XXXXX via spearphishing" needs to become "Russian state actors are targeting our supply chain --- here is the business risk and our mitigation plan."
  • Scaling a TI program beyond manual processes is an often-overlooked challenge. Many programs rely on high-degree subject matter expertise without defined, repeatable processes.

Analyst burnout:

  • CTI analyst roles combine high-stress monitoring with intellectually demanding research. The talent pipeline is thin --- experienced analysts are poached frequently, and 70% of SOC analysts with five years or less experience leave within three years (Torq).
  • Organizations deploy an average of 28 security monitoring tools, each generating its own alert stream. CTI analysts must context-switch across multiple platforms and consoles.
timeline
    title Evolution of Threat Intelligence
    2005 : Early Threat Feeds
         : IP/domain blocklists
         : Manual IOC sharing
    2012 : MITRE ATT&CK Born
         : STIX/TAXII standards
         : First commercial TIPs
    2015 : Platform Era
         : Recorded Future, Anomali
         : ThreatConnect
         : Dark web monitoring
    2019 : MITRE ATT&CK Mainstream
         : Automated enrichment
         : TI operationalization
    2024 : AI-Powered TI
         : LLM-driven analysis
         : Mastercard buys RF
    2026+ : Agentic TI
          : Autonomous threat hunting
          : Real-time AI correlation

Key trends shaping 2025--2027:

  1. AI and LLM integration for threat analysis. Google's agentic TI platform deploys specialized AI agents that autonomously pull from OSINT, dark web, Mandiant reports, and VirusTotal data to answer analyst queries (Help Net Security). Recorded Future and Anomali are similarly embedding LLMs for automated report summarization, IOC extraction, and threat actor profiling. Research tools like IntelEX extract TTPs and threat actors from unstructured reports, while Cylens specializes in malware clustering.

  2. Agentic AI for autonomous threat hunting. The arrival of AI agents in 2025 heralded new possibilities for CTI: agents built on LLMs can reason and autonomously perform intelligence tasks with minimal human involvement. Dataminr's ThreatConnect acquisition explicitly targets "agentic AI-powered client-tailored intelligence" as the next frontier (Dataminr).

  3. Threat intelligence shifting from defense to strategy. 43% of security leaders now use TI for strategic business planning --- guiding investment decisions, risk assessments, and resource allocation. 65% say TI directly supports security technology purchasing decisions (Recorded Future). TI is moving from the SOC to the C-suite.

  4. Adversaries weaponizing AI. AI-generated phishing has surged by 1,265%+ (Check Point). "Just-in-time" AI malware families like PROMPTFLUX and PROMPTSTEAL use LLMs during execution to dynamically generate malicious scripts and obfuscate code (Microsoft). Dark LLMs (WormGPT, GhostGPT, FraudGPT) are sold on underground markets with subscription-based access.

  5. Threat-informed defense operationalization. MITRE's Center for Threat-Informed Defense is driving adoption of ATT&CK-based defensive strategies that directly map organizational controls to real-world adversary behavior. This "threat-informed defense" approach starts with coverage analysis and detection engineering, then progresses to simulation planning and metrics-driven decision-making (MITRE CTID).

  6. Intelligence sharing evolution. ISACs and ISAOs continue to grow, but sharing friction persists. MISP's 2025 transition to the 2.5 branch delivered major UI/UX improvements and reduced API latency for large-scale datasets, lowering the barrier for community intelligence sharing (MISP Project).

Gaps & Underserved Areas

Market Gaps

  • SMB/mid-market threat intelligence is largely unaddressed --- most TI platforms are priced and designed for enterprise buyers with dedicated CTI teams. AI-powered "TI-as-a-service" could democratize access
  • OT/ICS-specific threat intelligence has few specialized providers; most TIPs focus on IT threats and have limited coverage of ICS-specific adversary TTPs and industrial protocols
  • Supply chain threat intelligence --- proactive monitoring of third-party and fourth-party supplier compromise --- is nascent despite being a top attack vector
  • Automated TI operationalization --- closing the gap between receiving intelligence and acting on it --- remains unsolved for most organizations

Underserved

  • Non-English threat intelligence: Most TI platforms and reports are English-centric; coverage of Chinese, Russian, Farsi, and Arabic-language threat actor forums varies widely and often depends on scarce human linguists
  • Intelligence for cloud-native threats: TI focused on cloud misconfigurations, container escape techniques, and serverless attack patterns is underdeveloped compared to traditional network/endpoint threat intelligence
  • Regional / sector-specific intelligence: Vertical-specific TI (e.g., healthcare-focused, maritime-focused, election security-focused) is available from select vendors but fragmented and difficult to source
  • TI quality scoring and benchmarking: No industry-standard methodology exists to compare the quality, timeliness, or accuracy of different intelligence feeds --- buyers rely on vendor claims and peer recommendations
  • Credential leak intelligence for SMBs: Dark web credential monitoring is widely available for enterprises but prohibitively expensive or absent for small businesses, which are disproportionately targeted

Geographic Notes

Region Characteristics
North America Largest market (~37% of revenue, ~$3.1B in 2025, Precedence Research). Recorded Future, CrowdStrike, Flashpoint, Intel 471 headquartered here. US government is the single largest TI consumer (IC, DOD, CISA). SEC disclosure rules drive corporate demand.
Europe ~$1.5B market (2024). GDPR and DORA drive compliance-led buying. ANSSI (France) developed OpenCTI. Strong CERT/CSIRT community drives MISP adoption. Sekoia.io (France) emerging as European TIP alternative. Data sovereignty requirements favor EU-hosted solutions.
APAC Fastest-growing region (highest CAGR through 2032). Japan and Australia are mature markets; India, Singapore, and South Korea are growth markets. Nation-state threat landscape (China, North Korea) drives government TI investment. Limited local vendor presence --- mostly US/EU vendor field offices.
Middle East / Africa Growing demand driven by national cyber mandates (Saudi NCA, UAE NESA, Israel's cyber ecosystem). Israel is a major TI vendor hub (Cybersixgill, Kela, Sixgill). Preference for managed TI services over self-operated platforms.

Open-Source Alternatives

Tool Description Strengths Limitations
MISP Malware Information Sharing Platform; leading open-source TIP for IOC sharing within trusted communities. Widely used by government CERTs and ISACs. 2.5 branch (2025) delivered major UI/UX overhaul. Massive community; peer-to-peer sharing model; extensive integrations (SIEM, IDS, firewalls); reduced API latency in 2.5; strong STIX/TAXII support Primarily IOC-focused (less structured threat modeling); UI historically dated (improving in 2.5); requires dedicated admin; limited built-in analytics
OpenCTI Open Cyber Threat Intelligence Platform developed with support from ANSSI (France). Structured knowledge graph showing relationships between threats, actors, IOCs, and vulnerabilities. Follows STIX 2.1. Knowledge graph visualization; STIX 2.1 native; strong relationship mapping; growing connector ecosystem; commercial support available via Filigran Resource-intensive deployment (Elasticsearch, Redis, RabbitMQ); steeper learning curve; smaller community than MISP; enterprise features require Filigran commercial license
YARA Pattern-matching tool for malware researchers. Defines rules to identify and classify malware samples based on textual or binary patterns. Industry standard for malware classification; lightweight; integrates with virtually all security tools; extensive community rule sets Not a platform --- a rule language/engine; requires expertise to write effective rules; no built-in sharing or management capabilities
Abuse.ch Community-driven threat intelligence feeds including URLhaus, MalwareBazaar, ThreatFox, and Feodo Tracker. Free IOC feeds in multiple formats. Free; high-quality community-curated data; multiple specialized feeds; easy API integration; widely used as baseline intelligence Limited scope (malware/botnet focused); no analysis platform; no dark web coverage; community-dependent quality
AlienVault OTX Open Threat Exchange; community-driven threat data sharing platform with "pulses" (collections of IOCs). Free tier available. Large community (200K+ participants); easy to use; good for basic IOC lookups; free; integrates with AlienVault USM Owned by AT&T/LevelBlue --- unclear long-term commitment; lower curation quality than paid feeds; limited enrichment; pulse quality varies
IntelOwl Open-source OSINT and threat intelligence automation tool. Aggregates data from 100+ analyzers and connectors in a single API call. Automates IOC enrichment from multiple sources; modular analyzer architecture; Docker-based deployment; active development Enrichment/aggregation tool, not a full TIP; requires other tools for sharing and workflow; smaller community

Open-Source Strategy

The strongest open-source TI stack combines MISP (IOC sharing and community intelligence) with OpenCTI (structured threat modeling and knowledge graph) and YARA (malware classification). MISP handles peer-to-peer intelligence exchange with ISACs and CERTs, OpenCTI provides the analytical layer with ATT&CK mapping and relationship visualization, and YARA enables custom malware detection rules. This stack provides capabilities approaching a mid-tier commercial TIP for organizations with 1--2 dedicated CTI engineers --- but requires significant operational investment and offers no SLA-backed support or finished intelligence products.

Sources & Further Reading

  1. MarketsandMarkets --- Threat Intelligence Market Size & Forecast (2025--2030)
  2. Precedence Research --- Threat Intelligence Market Size (2025--2035)
  3. Mordor Intelligence --- Threat Intelligence Market Size & Share (2025--2030)
  4. Fortune Business Insights --- Threat Intelligence Market (2026--2034)
  5. Mastercard --- Finalizes Acquisition of Recorded Future (Dec 2024)
  6. Dataminr --- Announces Intent to Acquire ThreatConnect ($290M, Oct 2025)
  7. SecurityWeek --- Dataminr to Acquire ThreatConnect for $290 Million
  8. Recorded Future --- 2025 State of Threat Intelligence Report
  9. Google Cloud --- Agentic Threat Intelligence Platform
  10. Google Cloud --- Threat Intelligence Product
  11. Microsoft --- AI as Tradecraft: How Threat Actors Operationalize AI (2026)
  12. Check Point --- AI Security Report 2025
  13. Google Cloud --- GTIG AI Threat Tracker
  14. Picus Security --- From Noise to Knowledge: Tackling Challenges in CTI
  15. MITRE ATT&CK --- Official Site
  16. MITRE Center for Threat-Informed Defense
  17. MISP Project --- 2025 Progress and Open Source Future
  18. OpenCTI --- GitHub Repository
  19. Cosive --- MISP vs. OpenCTI: 2025 Guide
  20. CSO Online --- Threat Intelligence Platform Buyer's Guide
  21. Gartner Peer Insights --- Security Threat Intelligence Products and Services
  22. Flare --- Top 14 Threat Intelligence Platforms for 2026
  23. The Business Research Company --- Dark Web Intelligence Market Report
  24. Dropzone AI --- Alert Fatigue in Cybersecurity
  25. Anomali --- Preventing SOC Alert Fatigue
  26. The Hacker News --- Turning Intelligence Into Action with Threat-Informed Defense
  27. Flashpoint --- Comprehensive Threat Intelligence
  28. Intel 471 --- Annual Threat Report 2024 & Outlook for 2025

Glossary

This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.

A

Term Definition
ACL Access Control List — rules determining which users/systems can access resources
APT Advanced Persistent Threat — a prolonged, targeted cyberattack where an intruder gains and maintains unauthorized access
ASM Attack Surface Management — continuous discovery, inventory, and risk assessment of an organization's external-facing assets
ASPM Application Security Posture Management — unified visibility and risk management across the application lifecycle
AV Antivirus — software designed to detect, prevent, and remove malware

B

Term Definition
BAS Breach and Attack Simulation — automated tools that simulate real-world attacks to test security controls
BEC Business Email Compromise — a social-engineering attack targeting employees with access to company finances or data

C

Term Definition
C2 Command and Control — infrastructure used by attackers to communicate with compromised systems
CASB Cloud Access Security Broker — a security policy enforcement point between cloud consumers and providers
CCPA California Consumer Privacy Act — California state law granting consumers rights over their personal data
CIAM Customer Identity and Access Management — managing and securing external customer identities and authentication
CIEM Cloud Infrastructure Entitlement Management — managing identities and privileges in cloud environments
CTEM Continuous Threat Exposure Management — a program for continuously assessing and prioritizing threat exposures
CNAPP Cloud-Native Application Protection Platform — integrated security for cloud-native applications across the full lifecycle
CSPM Cloud Security Posture Management — continuous monitoring of cloud infrastructure for misconfigurations and compliance risks
CWPP Cloud Workload Protection Platform — security for workloads running in cloud environments (VMs, containers, serverless)
CVE Common Vulnerabilities and Exposures — a standardized identifier for publicly known cybersecurity vulnerabilities

D

Term Definition
DAST Dynamic Application Security Testing — testing a running application for vulnerabilities by simulating attacks
DCS Distributed Control System — a control system for managing industrial processes across multiple locations
DLP Data Loss Prevention — tools and processes to prevent unauthorized data exfiltration or leakage
DORA Digital Operational Resilience Act — EU regulation on ICT risk management for financial entities
DSPM Data Security Posture Management — discovering, classifying, and protecting sensitive data across cloud environments

E

Term Definition
EASM External Attack Surface Management — discovering and monitoring internet-facing assets for exposures
EDR Endpoint Detection and Response — tools that monitor endpoints for threats and provide investigation and response capabilities
EPP Endpoint Protection Platform — integrated endpoint security combining prevention, detection, and response

F/G

Term Definition
FAIR Factor Analysis of Information Risk — a quantitative model for understanding, analyzing, and measuring information risk
GRC Governance, Risk, and Compliance — integrated framework for aligning IT with business goals, managing risk, and meeting regulations
GDPR General Data Protection Regulation — EU regulation on data protection and privacy for individuals

H

Term Definition
HIPAA Health Insurance Portability and Accountability Act — US law governing the privacy and security of health information

I

Term Definition
IAB Initial Access Broker — specialized cybercriminals who compromise networks and sell access to ransomware operators and other buyers
IAM Identity and Access Management — framework for managing digital identities and controlling access to resources
ICS Industrial Control System — control systems used in industrial production and critical infrastructure
IDS Intrusion Detection System — a system that monitors network traffic for suspicious activity and alerts
ITDR Identity Threat Detection and Response — detecting and responding to identity-based attacks and compromises
IoT Internet of Things — network of physical devices embedded with sensors, software, and connectivity
IPS Intrusion Prevention System — a system that monitors and actively blocks detected threats in network traffic

L

Term Definition
LOTL Living Off the Land — attack technique using legitimate, pre-installed system tools and binaries rather than custom malware to evade detection

M

Term Definition
MaaS Malware-as-a-Service — cybercrime business model where malware developers sell or rent their tools to other criminals
MDR Managed Detection and Response — outsourced security service providing 24/7 threat monitoring, detection, and response
MITRE ATT&CK MITRE Adversarial Tactics, Techniques, and Common Knowledge — a knowledge base of adversary behaviors and techniques
MSSP Managed Security Service Provider — a third-party provider offering outsourced monitoring and management of security devices
MFA Multi-Factor Authentication — requiring two or more verification factors to gain access to a resource

N

Term Definition
NDR Network Detection and Response — detecting and responding to threats by analyzing network traffic patterns
NERC CIP North American Electric Reliability Corporation Critical Infrastructure Protection — security standards for the electric grid
NGAV Next-Generation Antivirus — advanced antivirus using behavioral analysis, AI, and machine learning beyond signature-based detection
NIS2 Network and Information Systems Directive 2 — updated EU directive on cybersecurity for essential and important entities
NIST CSF National Institute of Standards and Technology Cybersecurity Framework — a voluntary framework for managing cybersecurity risk

O

Term Definition
OT Operational Technology — hardware and software that monitors and controls physical devices and processes
OWASP Open Worldwide Application Security Project — a nonprofit focused on improving software security through open-source projects and guidance

P

Term Definition
PAM Privileged Access Management — securing, managing, and monitoring privileged accounts and access
PCI DSS Payment Card Industry Data Security Standard — security standards for organizations that handle credit card data
PII Personally Identifiable Information — any data that could identify a specific individual
PLC Programmable Logic Controller — an industrial computer used to control manufacturing processes

R

Term Definition
RaaS Ransomware-as-a-Service — cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits
RGB Reconnaissance General Bureau — North Korea's primary intelligence agency responsible for clandestine operations including cyber operations

S

Term Definition
SASE Secure Access Service Edge — converged network and security-as-a-service architecture delivered from the cloud
SAST Static Application Security Testing — analyzing source code for vulnerabilities without executing the application
SBOM Software Bill of Materials — a formal inventory of components, libraries, and dependencies in a software product
SCA Software Composition Analysis — identifying open-source components and known vulnerabilities in a codebase
SCADA Supervisory Control and Data Acquisition — a system for monitoring and controlling industrial processes remotely
SD-WAN Software-Defined Wide Area Network — a virtual WAN architecture that simplifies branch networking and optimizes traffic
SEG Secure Email Gateway — a solution that filters inbound and outbound email to block threats and enforce policies
SIEM Security Information and Event Management — aggregating and analyzing log data for threat detection and compliance
SOAR Security Orchestration, Automation, and Response — tools that automate and coordinate security operations workflows
SOC Security Operations Center — a centralized team and facility for monitoring, detecting, and responding to security incidents
SOX Sarbanes-Oxley Act — US law mandating financial reporting and internal control requirements for public companies
SSE Security Service Edge — the security component of SASE, delivering SWG, CASB, and ZTNA as cloud services
SWG Secure Web Gateway — a solution that filters web traffic to enforce security policies and block threats

T

Term Definition
TAM Total Addressable Market — the total revenue opportunity available for a product or service
TCO Total Cost of Ownership — the complete cost of acquiring, deploying, and operating a solution over its lifetime
TIP Threat Intelligence Platform — a system for aggregating, correlating, and operationalizing threat intelligence data
TLS Transport Layer Security — a cryptographic protocol that provides secure communication over a network
TTP Tactics, Techniques, and Procedures — the patterns of behavior and methods used by threat actors to conduct cyber operations

V

Term Definition
VM Vulnerability Management — the ongoing process of identifying, evaluating, treating, and reporting security vulnerabilities

X

Term Definition
XDR Extended Detection and Response — unified threat detection and response across endpoints, network, cloud, and email

Z

Term Definition
ZTNA Zero Trust Network Access — a security model that grants access based on identity verification and least-privilege principles