THREATNOIR
SOC & Threat Hunting
Daily briefings + IOCs you can operationalize fast.
CISOs & Leaders
Board-ready context and weekly risk signal.
Learners
Learn from real incidents, not hypotheticals.
Builders
APIs, MCP, and automation-ready threat intel.
Feed
Briefs IOCs Legal
Podcast Weekly Roundup Reviews
Tips & Tricks Awareness Red vs Blue Show Events Resources
Developer
Subscribe
Log in
For builders

APIs, MCP & Threat Intel for Builders

Integrate IOCs and curated security signal into your tooling. Use the ThreatNoir MCP server for AI workflows, or the REST API for automation.

Open Developer Portal → View OpenAPI spec →

What you’ll find

Developer portal
MCP server + API key setup + copy/paste examples.
IOC search
Search and operationalize IOCs from approved sources.
Feed
Curated articles to power enrichment and triage workflows.
Podcast
Daily briefing as a fast “what changed?” input stream.

Start with this

Latest approved article (great sample input for your pipelines).

Browse feed →
Latest
KongTuke hackers now use Microsoft Teams for corporate breaches

Initial access broker KongTuke has moved to Microsoft Teams for social engineering attacks, taking as little as five minutes to gain persistent access to corporate networks. [...]

THREATNOIR

© 2026 ThreatNoir. All rights reserved.

FeedBriefsIOCsPodcastWeekly RoundupTipsAwareness LessonsResourcesDeveloperLegalContact
System status: nominal