The Maltiverse Threat Observatory is a real-time cyber threat intelligence panel designed to provide high-level situational awareness and actionable context regarding global cyber attacks. Thanks to the convergence of Lumu's extensive detection telemetry and Maltiverse’s threat intelligence capabilities, the Threat Observatory ingests anonymized feedback from over 1,800 clients and 2.1 billion detected contacts, enriching Indicators of Compromise (IoCs) with critical real-world context.
This capability allows security teams to instantly validate if a threat is actively affecting their specific industry or region, enabling a shift from reactive monitoring to proactive, sector-specific risk mitigation.
Designed to support workflows ranging from executive reporting to technical threat hunting, the Threat Observatory offers a comprehensive panel of interconnected tools. These components work in unison to provide visibility into active threats, alignment with standards like MITRE ATT&CK, and easy-to-use interfaces for generating quick insights.
The following sections detail the core capabilities of the Threat Observatory.
To ensure intelligence is actionable, the Threat Observatory utilizes a sophisticated filtering engine that segments global threat data into highly relevant subsets. By applying precise criteria, analysts can instantly narrow the scope of investigation from billions of detections to only those threats affecting specific sectors, regions, or timeframes, ensuring that every alert displayed is pertinent to the organization's unique risk profile.
The filters use AND logic, creating precise intersections of data. This ensures high relevance; for example, an analyst can drill down to isolate only Malicious threats that are specifically targeting Financial Services within the United States, eliminating noise from unrelated sectors or regions.
Users can filter by:
| Category | Description |
| Government / Public Sector | Government agencies, law enforcement, public services. |
| Financial Services | Banking, fintech, insurance. |
| Healthcare and Pharmaceutical | Hospitals, providers, biotech, pharmaceuticals. |
| Energy and Utilities | Electricity, oil, gas, water, nuclear. |
| Manufacturing | Industrial, automotive, aerospace, chemicals, consumer goods. |
| Technology and Telecommunications | IT, software, hardware, cloud, telephony, internet. |
| Transportation and Logistics | Air, maritime, land transport, shipping, logistics. |
| Retail and Hospitality | Retail (e-commerce/physical), hotels, tourism, restaurants. |
| Media and Entertainment | News, broadcasting, film, gaming, sports. |
| Professional Services | Consulting, legal, auditing, B2B outsourcing. |
| Defense and Aerospace | Military contractors, defense industry, aerospace manufacturers. |
| Education and Nonprofits | Universities, research, NGOs, foundations. |
Using the Open Query with filters capability allows users to quickly change from monitoring to investigation. This feature instantly transforms applied filters into a query for the Maltiverse Search Engine.
This allows analysts to pivot from a high-level overview to a deep-dive investigation without manual setup. The resulting queries can be used to create custom Threat Intelligence Feeds specific to an organization's profile.
Refer to Create Custom Threat Intelligence Feeds for more information.
The Threat Observatory includes interactive visual interfaces designed to benchmark an organization's security posture against global and regional trends.
This interactive map visualizes attack flows from the previous 60 minutes, highlighting hotspots and tracing attack paths to identify geographic patterns or campaigns in real-time.
While the map provides a visual overview, the Attack Insights Panel offers a granular, listed view of active threats. Enriched by Lumu's feedback, these entries represent verified detections rather than theoretical risks, providing high-confidence intelligence. This structured data is ideal for operational alerts and executive reporting, allowing teams to communicate specific emerging risks clearly.
This feature ranks sources, targets, and industries by detection frequency. Security analysts can use this data to identify if their organization’s sector is experiencing a surge in targeted activity compared to the global baseline, aiding in strategic resource allocation.
This table breaks down threats by specific types and families for granular technical analysis. It ranks threats by occurrence, enabling teams to prioritize mitigation efforts against the most prevalent vectors. You can filter the dataset by five distinct criteria—Blacklist Description, Mitre Software, Mitre Groups, Region, or Industry—to answer specific intelligence questions.
For example, grouping by Blacklist Description (e.g., "Phishing Artifact," "Trojan.generic") or Mitre Software allows security teams to focus their detection efforts on the most prevalent attack vectors.