Logos for Criminal IP and Palo Alto Networks appear side by side on a blue and green digital background, with text below stating: Criminal IP is now available in Palo Alto Networks Cortex.

Criminal IP and Palo Alto Networks Cortex XSOAR integrate to bring AI-driven exposure intelligence to automated incident response

By Published On: December 24, 2025

The speed and sophistication of cyber threats underscore a critical need for security operations to evolve. Automated incident response, while powerful, often lacks the immediate, granular external context needed to truly preempt or neutralize evolving attacks. This gap has long challenged security teams striving for proactive defense.

AI-Driven Exposure Intelligence Meets Automated Response

In a significant move to bridge this gap, Criminal IP, the AI-powered threat intelligence and attack surface monitoring platform by AI SPERA, has officially integrated with Palo Alto Networks’ Cortex XSOAR. Announced on December 19th, 2025, this integration directly embeds real-time external threat context, exposure intelligence, and automated multi-stage scanning capabilities into Cortex XSOAR’s powerful orchestration engine.

This collaboration transforms how security operations centers (SOCs) can leverage automation. By infusing high-fidelity, AI-driven insights from Criminal IP (criminalip.io) directly into Cortex XSOAR, security teams gain unparalleled visibility into their external attack surface and emerging threats. This isn’t merely about data aggregation; it’s about contextually enhancing automated playbooks to make smarter, faster decisions.

Understanding Criminal IP’s Role in Threat Context

Criminal IP provides a crucial layer of intelligence by continuously monitoring and analyzing internet-facing assets for vulnerabilities, misconfigurations, and other exploit opportunities. Its AI engine processes vast amounts of data to identify:

  • Open ports and services that could be exploited.
  • Leaked credentials or sensitive information.
  • Phishing domains mimicking legitimate assets.
  • Emerging threat indicators (IOCs) associated with new campaigns.

This “exposure intelligence” moves beyond traditional internal vulnerability scanning by focusing on what an attacker sees from the outside, thereby offering a truly adversarial perspective on an organization’s digital footprint.

Cortex XSOAR: Orchestrating a Proactive Defense

Palo Alto Networks Cortex XSOAR is an industry-leading Security Orchestration, Automation, and Response (SOAR) platform. Its core strength lies in its ability to centralize and automate security operations across various tools and processes. With the Criminal IP integration, XSOAR playbooks can now directly access:

  • Real-time Threat Context: Instantly enrich incident data with external threat intelligence, categorizing threats and understanding their potential impact.
  • Exposure Intelligence: Prioritize alerts based on actual external risk, rather than solely internal observations. This helps differentiate critical threats from noise.
  • Automated Multi-Stage Scanning: Trigger Criminal IP scans directly from XSOAR workflows to dynamically investigate suspicious IPs, domains, or asset ranges uncovered during an incident, without manual intervention.

For example, if an XSOAR playbook detects a suspicious IP attempting to access an organization’s resources, it can automatically query Criminal IP for known vulnerabilities, reputation scores, or associations with malicious campaigns like a CVE-2023-38831 remote code execution vulnerability. This immediate contextual enrichment enables a more informed and aggressive automated response, such as instantly blocking the IP and initiating further forensic analysis.

The Power of AI-Enhanced Automation for SOCs

This integration directly addresses several key challenges faced by modern SOCs:

  • Alert Fatigue Reduction: By enriching alerts with external context, security analysts can quickly differentiate legitimate threats from benign activities, reducing the volume of alerts requiring manual investigation.
  • Faster Incident Response: Automation of threat intelligence gathering and exposure analysis drastically cuts down response times, limiting the blast radius of attacks.
  • Proactive Threat Hunting: Security teams can leverage Criminal IP data within XSOAR to proactively identify and mitigate external exposures before they are exploited. This shifts the defense posture from reactive to predictive.
  • Enhanced Decision Making: Automated playbooks, informed by AI-driven insights, can make more intelligent decisions, leading to more effective and precise remediation actions.

Ultimately, the synergy between Criminal IP’s AI-powered attack surface visibility and Cortex XSOAR’s robust orchestration capabilities empowers security teams to build more resilient and automated defense strategies against a perpetually evolving threat landscape.

Share this article

Leave A Comment