5/6
Built by a team that's spent 25+ years on the internet's core stack:
ex-RIPE NCC, ICANN, IETF, K-root operator.
Advised by Internet Hall of Fame inductees Geoff Huston (APNIC) and
Jeff Osborn (ISC), and Cisco/security veteran Merike Kaeo.
Already in production at TRM Labs.
1/6
📢We just shipped Whisper AI Context.
A free-tier MCP server that gives your security AI agent live infrastructure intelligence, BGP, DNS, WHOIS, threat-graph, in 2 minutes of setup.
[60-second install screencast]
👉whisper.security
🧵
AI can explain a lot of things. But not how infrastructure actually connects.
🔺DNS, BGP, certs, WHOIS, the data is public.
The missing piece is context.
Give AI fragments, it summarizes.
Give it relationships, it investigates.
More in comments 👇
#AI#ThreatIntel#InfoSec
⚠️ Three companies. One failure.
You don’t have an infrastructure problem, you have a dependency problem.
🔺Same clouds.🔺 Same DNS. 🔺Same routes.
Different vendors, same failure point!
Infrastructure is visible. Dependencies aren’t.
That’s where risk lives.
More in comments 👇
The data is public. The relationships are not. Domains, IPs, DNS, certs, routing, all visible.
⚠️Attackers see systems.
🔺Defenders see fragments.
The signal isn’t in the data, it’s in the connections.
👉Swipe → see the connections. Full breakdown in comments.
#InfoSec
What if the phishing domain you blocked was just one of twenty? Blocklists are reactive. Attackers rotate fast.
Phishing runs in batches, sharing registrars, DNS, hosting, and infrastructure patterns.
See why blocklists fall behind
Read more in comments 👇
#ThreatIntel#InfoSec
Going to be spinning up a little series of posts with some Blue Team specific Claude tips - follow along with
#ClaudeForBlueTeam
First tip - ATT&CK can be downloaded as a JSON file, which Claude loves to work with. Remember, ATT&CK has a Data Source component - use Claude to ask some questions like "What logs do I need to detect X" or "What data source do I need to enable to cover the most techniques"
Technology doesn’t exist in a vacuum.
Understanding the human and economic systems behind it is key to better security.
Thrilled to welcome Dr. Jonathan Cave to the Whisper Advisory Board. His expertise in economics, policy, and trust will help shape cybersecurity
#TechPolicy
One phishing domain is never just one.
Attackers register them in bulk across shared infrastructure.
Block one, dozens remain.
Map the infrastructure, not just the indicator.
👉whisper.security#Phishing#InfoSec#ThreatIntel#CyberThreats
More in the comments 👇
Some build products. Others build companies.
Few do both.
From UUNET to MakerBot to leading the Internet Systems Consortium, Jeff Osborn has shaped critical internet infrastructure.
Thrilled to welcome him to the Whisper Advisory Board.
Let’s build what’s next.
#TechLeadership
Your firewall isn’t your perimeter. Every SaaS tool and third-party script extends your attack surface. When their infrastructure fails, you feel it.
🔎Map what you can’t see.
Try Whisper’s free API.
#AttackSurfaceManagement#SupplyChainSecurity
👇Read more in comments