Abstract: Highlights•Knowledge incorporation to augment the model's understanding of cybersecurity text.•Cyber threat intelligence entity and relation extraction that shows a comprehensive picture of the threat.•Attack trends and attack organization profiling exploration based on a large number of reports.