The Risk Letters is different — it's not an abstract feed of CVE numbers. It's intelligence filtered through decades of hands-on experience with the systems these vulnerabilities actually affect.
We built The Risk Letters because we needed it ourselves and we were tired of the gap between raw threat data and the enormous amount of decisions security teams need to make before lunch.
Every day at 05:00 CET, an automated pipeline begins collecting data from the six primary upstream risk sources and correlates this with hundreds of open source intelligence feeds. By 07:00, your brief is in your inbox.
Parallel ingestion from six feeds. New CVEs, exploitation predictions, known exploited vulnerabilities, threat actor campaigns, malicious infrastructure, and ATT&CK technique mappings.
Cross-reference across feeds and OSINT sources. A CVE with rising EPSS score + a KEV entry + an OTX pulse and OSINT correlations mentioning the same actor = a signal that single-source monitoring would miss.
Structured brief with context, not just data. Every threat paired with specific recommendations — which patch, which system, by when along with cross-domain correlations, geo-political analysis, financial risks and more.
No noise, no recycled press releases — just cross-correlated signals with specific recommendations you can act on today. Delivered 07:00 CET.
Free
Free
The full daily brief for individuals and teams getting started.
Professional
39 EUR/month
Personalized intel matched to your tech stack, plus machine-readable feeds.
Coming in 2026
Risk Letters is powered by Risk Signal: a platform that continuously monitors, correlates, and analyses threat signals across thousands of sources. In 2026 we open it to security teams who want the full engine — not just the daily digest.
Learn more at risksignal.eu →