The trending attacks feature will let you know if your assets are impacted or not by vulnerabilities exploited in the wild.
As a CERT (Computer Emergency Response Team), Patrowl performs continuous and real-time threat monitoring. The sources of this CTI monitoring include CERT FR advisories, the CISA list of vulnerabilities exploited in the wild (KEV / Known Exploited Vulnerabilities), vendors' alerts, researchers' blogs, code repositories, microblogging platforms, etc.
When a new exploit code is detected or a vulnerability is exploited in the wild, Patrowl is informed and, having a quasi-exhaustive repository of what you expose on the Internet, very quickly checks the vulnerability on all your assets exposed on the Internet.