All Posts
ThreatStream
Cyber Threat Intelligence
1
min read

Flexera Software Vulnerability Research is Now Available in ThreatStream

Anomali is excited to add Flexera’s Software Vulnerability Research as a premium intelligence feed in the Anomali Preferred Partner store.
Published on
June 25, 2025
Table of Contents

About Flexera Software Vulnerability Research

Flexera Software Vulnerability Research provides access to verified intelligence from Flexera's independent Secunia Research Team, and includes software vulnerability intelligence across all applications, systems, and platforms. Data is received on both push and pull grounds from numerous sources (web, mailing lists, githubs, Microsoft API, etc.) and is then aggregated and analyzed by the Secunia Research Team.

The Software Vulnerability Research feed provides associations of known exploits to Common Vulnerabilities and Exposures (CVEs) within software product advisories. The Secunia Research Team sources data for the feed through conducting vulnerability research in various products along with testing and verifying public vulnerability reports.

Activating Flexera Software Vulnerability Research in ThreatStream

Activating the Flexera Software Vulnerability Research feed in ThreatStream allows CTI teams to correlate Flexera’s vulnerability intelligence with other active intelligence sources in ThreatStream. Anomali provides additional context about the severity/confidence of potential threats, deduplicates any indicators of compromise that are present in other active intelligence feeds, and can seamlessly distribute this intelligence to other security tools.

Activating the feed in ThreatStream requires an active subscription for Flexera Software Vulnerability Research. To enable the feed, users must click on the “Flexera Software Vulnerability Research” tile within the ThreatStream APP Store and submit their credentials provided by Flexera.

Get Started with Anomali ThreatStream

If you’d like to see how Anomali ThreatStream can help to contextualize, enrich, deduplicate, and orchestrate Flexera’s Software Vulnerability Research along with 200+ other intelligence feeds available in the ThreatStream APP Store, request a demo today.

FEATURED RESOURCES

January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
Explore All