The hunt starts now. Predict. Track. STRIKE
STRIKE sees what others miss, turning live threat signals into instant action—so your SOC can hunt, track, and shut down attacks before they take flight.

STRIKE with precision, act with power
-
You Can’t Stop
What You Can’t SeeEvery alert feels like another false positive. Your SOC deserves better. STRIKE delivers real-time intel that lets you strike first, transforming your team from alert responders into threat hunters.
-
Most Vendors Buy Their Intel—STRIKE Creates It
While others package up stale threat feeds, your team could be hunting with live, lethal intel. STRIKE processes 12B+ daily security signals, transforming your SOC from data analysts into apex predators who strike first.
-
Adversaries Don’t Wait—Neither Should Your Defense
While others fly blind, your team strikes with radar precision. STRIKE detects C2 servers and attack infrastructure before weaponization, transforming your SOC from reactive observers into shadow hunters.
As seen in
About STRIKE
Our team has spent decades in the trenches – as intelligence analysts, threat hunters, and military cyber operators. We’ve tracked the world’s most dangerous adversaries. Now this intelligence fuels your security operations.
Meet some of our team

Distinguished Engineer, R&D Strategy
Dr. Jared Smith
Dr. Jared Smith is a Distinguished Threat Researcher at SecurityScorecard, leading technical threat research engagements and overseeing global threat intelligence data collection. His work has been cited in Forbes, Dark Reading, BBC, and FOX. Previously, he served as Lead Scientist for AI in Cybersecurity at the U.S. Department of Energy’s national security division and held a TS/SCI clearance. He holds a Ph.D. in Computer Science from the University of Tennessee, where he developed pioneering Internet routing techniques to mitigate large-scale DDoS attacks. A former penetration testing instructor at NYU, he also worked on Cisco’s internal offensive security team. Jared has authored over 20 peer-reviewed papers, holds four granted patents, and has presented at more than 30 industry and academic conferences worldwide.

Chief Information Security Officer (CISO)
Steve Cobb
Steve Cobb is the Chief Information Security Officer (CISO) at SecurityScorecard, bringing over 30 years of expertise in cybersecurity, IT infrastructure, and cyber threat intelligence. He has led cybersecurity teams at major enterprises, including Verizon, Microsoft, RBC, PNC Bank, and Capital One. He serves on multiple CISO advisory boards and is a regular speaker at industry conferences such as InfoSeCon and Cyber Defense Summit. With extensive experience in risk management and cyber resilience, Steve has advised organizations on incident response, compliance, and security strategy. His leadership spans both private and public sectors, where he has driven enterprise-wide security initiatives to mitigate evolving threats.

SVP, Threat Research & Intelligence
Ryan Sherstobitoff
Ryan Sherstobitoff is the Senior Vice President of Threat Research & Intelligence at SecurityScorecard, overseeing global efforts to track nation-state actors, ransomware operations, and critical vulnerabilities. He has played a key role in high-profile investigations, including Operation Troy and Dark Seoul, shaping the cybersecurity industry’s understanding of North Korean threat actors. With over 14 years in cybersecurity, Ryan specializes in advanced threat intelligence, detection, and response. He has collaborated extensively with government agencies and law enforcement to combat cyber threats and leads research into emerging attack vectors. His work informs intelligence-driven defense strategies that enhance the security posture of organizations worldwide.

Senior Penetration Tester
David Mound
David Mound is a cybersecurity expert specializing in Penetration Testing, Red Teaming, and Threat Intelligence. He has worked across government and commercial sectors, identifying vulnerabilities, assessing risk exposure, and simulating advanced cyber attack scenarios. His research into adversary tactics and novel techniques, such as data bouncing, contributes to the advancement of cyber defense strategies. David has presented at major cybersecurity forums, including ONG-ISAC and the UK Parliament, providing expert analysis on emerging threats and risk mitigation. His expertise in threat hunting and intelligence operations enables organizations to proactively defend against sophisticated cyber adversaries.

Senior Manager, Threat Insights & Attribution
Corian (Cory) Kennedy
Cory Kennedy is a cybersecurity strategist and threat intelligence leader with over two decades of experience in offensive and defensive security. As Head of SecurityScorecard’s STRIKE Team, he develops intelligence-driven frameworks to track, analyze, and disrupt advanced cyber threats. He previously led threat research at Microsoft and was instrumental in securing critical infrastructure at one of the world’s largest ISPs. A recognized innovator in cyber threat analysis, Cory created HackGPT and has conducted industry-defining research, including Android code analysis on DeepSeek. He is an accredited author on the STIX standard and has contributed to advancing adversary tracking methodologies. A frequent speaker at cybersecurity conferences, he focuses on operationalizing intelligence to preempt and mitigate sophisticated cyber attacks.
Hear from our clients
STRIKE with clear signals and bold action
-
Live Adversary Infrastructure Tracking
STRIKE tracks live threat infrastructure—C2 servers, phishing domains, and exploit staging—before it’s weaponized. By analyzing global telemetry, SSL/TLS logs, and darknet activity, it delivers real-time, machine-enriched intelligence in TAXII 2.1 and STIX 2.1 formats for seamless SIEM, SOAR, and EDR integration.
-
AI-Powered Threat Attribution & Predictive Intelligence
STRIKE’s ML-driven engines map threat actor behavior, linking malware, obfuscated domains, and adversary-controlled IPs to known campaigns. By aligning evolving tactics with MITRE ATT&CK, it enables SOC teams to anticipate attacks before execution. Intelligence is delivered via JSON-based APIs and custom dashboards for rapid action.
-
Seamless Security Integration & Automated Defense
STRIKE integrates seamlessly into security stacks, automating detection, correlation, and response. Enriched, deduplicated intelligence is pushed to Splunk, QRadar, Cortex XSOAR, and Azure Sentinel. Clients can automate firewall updates, deploy YARA signatures, and launch proactive threat hunts—cutting MTTD and MTTR.