Criminal IP and Palo Alto Networks Cortex XSOAR's AI-driven Exposure Intelligence for Automated Incident Response
- Dec 19, 2025
- 2 min read
Key Findings
Criminal IP, an AI-powered threat intelligence and attack surface monitoring platform, has officially integrated with Palo Alto Networks' Cortex XSOAR.
The integration embeds real-time external threat context, exposure intelligence, and automated multi-stage scanning directly into Cortex XSOAR's orchestration engine.
This integration enhances security teams' incident response capabilities by providing higher incident accuracy and faster response compared to conventional log-centric approaches.
Cortex XSOAR users can now evaluate suspicious IPs and domains not only through static reputation data but also through behavioral signals, exposure history, infrastructure correlations, and AI-driven threat scoring.
Background
Palo Alto Networks' Cortex XSOAR is a central hub for SOC automation, widely regarded as the global leader in cybersecurity.
Criminal IP is the flagship cyber threat intelligence platform developed by AI SPERA, used in more than 150 countries and providing comprehensive threat visibility through enterprise security solutions.
AI Context to Address the Limits of Log-Only Incident Response
Modern SOC teams face overwhelming alert volumes, and traditional enrichment still depends on static reputation feeds with limited context, often missing port exposure, CVE ties, certificate reuse, DNS changes, or anonymization behavior.
Criminal IP fills this gap by continuously analyzing global internet-facing assets and correlating IP behavior, domain activity, SSL/TLS data, port states, CVE exposure, IDS hits, and masking indicators.
Cortex XSOAR can automatically pull this enriched intelligence into active incidents via playbooks, allowing analysts to assess intent and severity without leaving the platform.
Multi-Stage Scanning and External Exposure Linking
Cortex XSOAR playbooks can trigger Criminal IP's automated three-stage scanning workflow: Quick Lookup, Lite Scan, and Full Scan for complete attack surface analysis.
The integration also links internal telemetry with open-internet intelligence, providing historical behavior, C2 relationships, anonymization indicators, abuse records, and SSL correlations for each indicator.
Cortex XSOAR can schedule Micro Attack Surface Management scans to assess exposed ports, certificate validity, vulnerable services, and outdated software, offering lightweight, continuous ASM capabilities.
Accelerating the Shift Toward Intelligence-Driven Autonomous Security
The integration between Palo Alto Networks and Criminal IP reflects a broader trend toward autonomous security operations.
By combining Cortex XSOAR's automation and orchestration capabilities with Criminal IP's real-time external analysis, SOC teams can automate decisions that previously required manual research across multiple intelligence sources.
This reduces response times, improves the accuracy of incident classification, and minimizes analyst fatigue, which have grown more severe as alert volumes and AI-generated threats continue to rise.
Sources
https://securityonline.info/criminal-ip-and-palo-alto-networks-cortex-xsoar-integrate-to-bring-ai-driven-exposure-intelligence-to-automated-incident-response/
https://hackread.com/criminal-ip-and-palo-alto-networks-cortex-xsoar-integrate-to-bring-ai-driven-exposure-intelligence-to-automated-incident-response/


Comments