An AI agent that monitors vulnerabilities, reports what matters, and saves time

We developed an AI agent that never sleeps – it monitors cybersecurity feeds around the clock, detects threats, and reports them automatically!

Cybersecurity threats are constantly emerging. New vulnerabilities are published across various sources every day, and identifying what’s relevant requires expert judgment. In many organizations, this means manual monitoring and sifting through large amounts of information—creating the risk that something important might be missed or reactions delayed.

At Hurja, we wanted to improve the process of monitoring cybersecurity sources and identifying relevant findings. AI proved to be a good fit for the task, as it combines efficiency with the ability to understand context. We organized an internal AI hackathon* with the goal of exploring how the manual process of detecting security risks could be automated using large language models (LLMs) and agent-based architecture.

The goal was to build an intelligent solution that monitors multiple cybersecurity sources, identifies relevant threats, and reports the findings in a clear and understandable way – reducing the time experts need to spend on daily manual screening.

*A hackathon is an intensive, short-term development event where a team builds new solutions within a limited time frame.

A configurable AI agent that monitors, understands, and reports

During the hackathon, we developed an AI solution that monitors trusted cybersecurity sources and automatically reports relevant findings to the necessary communication channels. In the solution we built, users can define which technologies and keywords to monitor—and on what criteria—without writing a single line of code.

The agent is built using the LangChain and LangGraph frameworks, allowing it to process data step by step: read the inputs, identify what’s relevant, and summarize the findings. LangGraph enables the agent to understand where it is in the process, what it has already handled, and what still needs to be reviewed.

The agent’s behavior is guided by instructions written in natural language—known as prompts. When requirements change, there’s no need for new programming—updating the prompt is enough.

The core of the AI agent architecture:

  • Input via Google Sheets: the user defines the sources, technologies, and keywords in a simple spreadsheet.
  • LangGraph agent: the AI agent is built using LangGraph. It analyzes the input data and makes decisions independently. LangGraph allows the agent to operate in steps—progressing logically and using previously gathered information in subsequent decisions. This makes it suitable for more complex workflows with interdependencies.
  • Prompt-driven logic: the agent follows a prompt written in natural language, which defines what the agent does and when. The prompt can be edited without coding.
  • Reporting to selected channels (e.g., Slack): when vulnerabilities are found, the agent sends a clear, concise summary to Slack—delivering the right information, at the right time, to the right people.
AI security Agent flowchart.
AI agent flow

Where can this be applied?

This type of architecture is a great fit for a variety of use cases, including:

  • In industry: combining maintenance logs, sensor data, and historical records—and suggesting preventive measures before breakdowns occur.
  • In digital customer service: analyzing customer interaction data and surfacing key insights in weekly summaries.
  • In the public sector: monitoring citizen feedback from multiple sources and generating actionable recommendations.

Bringing cybersecurity into everyday work—without the manual burden

The greatest benefit of the solution is its ability to process large amounts of data consistently and quickly. The AI agent reduces the manual effort required for monitoring security sources at Hurja, and supports our experts by helping them focus on action instead of early-stage filtering.

The agent automatically generates summaries and highlights relevant items, which makes it possible to respond more quickly—and deal with potential threats before they become real issues.

The solution is also easy to implement and adapt for different needs. The same technical structure can be applied to many other use cases, such as analyzing customer feedback or monitoring publicly available data sources.

Key benefits:

  • Scalability: the solution can be easily adapted to other applications (e.g. feedback analysis, industrial IoT monitoring, public sector feedback).
  • No-code configurability: users manage the agent’s behavior with natural language and a spreadsheet—technical entry barrier is low.
  • Transparency and accessibility of information: clear summaries ensure that critical data is understandable and visible across the organization.

AI agents like this open up entirely new ways to automate data collection and decision-making. They’re flexible, customizable, and fast to deploy—exactly what modern organizations need.

If your organization works with data, makes decisions, and needs to respond quickly—we know how to put AI to work for you.

Let’s build your own AI agent that takes care of the routine—so people can focus on smarter decisions.

Leave a contact request