Feedly
@feedly
Followers
104K
Following
26K
Media
593
Statuses
53K
Feedly is the fastest way to track the topics and trends that matter to you
San Francisco, CA
Joined April 2008
"Your system is infected by two viruses!" 🚨 Marcelle Lee got that popup and turned it into a full threat investigation uncovering 114 malicious domains and fake antivirus apps. Her step-by-step guide shows how to investigate scareware campaigns using only free tools. 👉
1
0
1
👉 Threat hunting without intelligence is like searching without a map. 👉 CTI without threat hunting is like having a map nobody uses. 👉 You need both. Will Thomas, Senior Threat Intelligence Advisor just released a new article for Feedly’s TI Essentials blog called: How to
feedly.com
0
0
3
Software #supplychain attacks are evolving faster than most #CTI programs can keep up with. On December 8th, we’re hosting a webinar to help analysts, #threathunters, and security teams close that gap. Special guest Paul McCarty, Founder of https://t.co/UJv74Ae8IO, will join
0
1
2
Feedly now supports #MITREATTCK v18 12 new enterprise techniques ⇒ 12 new Feedly AI Models are ready to track them across your #ThreatIntelligence feeds. Feedly automatically maps threat actor #TTPs from #OpenSource intelligence to the MITRE framework, so you find relevant
0
1
1
The best intelligence leaders aren't firefighters, they're builders. Paul Prouse, Owner of Astro Intelligence, breaks down how to advance from good to great leadership in intelligence, and it's not just technical expertise. Read the full piece👇 https://t.co/RoQpwGdl59
#CTI
0
0
3
#Phishing remains one of the most common entry points for #cyberattacks, but keeping employees informed shouldn't add to your workload. Our #CTI Advisor built an #AI Prompt that generates ready-to-send phishing awareness newsletters for your organization👇
feedly.com
0
0
2
Join us this Wednesday as Gage Taylor, #ThreatIntelligence Analyst at @bulletproof_IT, reveals how his team transforms raw cyberattack data into proactive #threathunts that protect MSSP clients. See the complete workflow in action, from monitoring threats to delivering
0
0
1
In his latest article: The Monitor: Tracking the known present, Director of #StrategicInnovation & Intelligence, @TKlaehne breaks down how real #marketmonitoring transforms data into action through: ✅ Signal pairing that validates patterns ✅ Real-time intelligence that shapes
0
0
1
Our "Trick or Breach" webinar brought together Feedly's #ThreatIntelligence Advisors to share their most memorable mistakes and lessons learned. The biggest takeaway? Every #CTI analyst has a story like this. Creating safe spaces for these conversations helps the entire
0
0
0
Missing the next big disruptor because they haven't raised funds yet? We’re excited to introduce the Startup Innovation Radar - your real-time window into startups in any market. Created to speed up discovery and analysis of startups in natural language, even pre-funding.
0
0
2
Good intelligence drives decisions and reduces risk. Does your CTI actually help the people who need it most? Read John E. Stoner’s new article on Feedly’s TI Essentials blog on the 3 core characteristics of high-quality threat intelligence. Learn how to: ✅ Align intelligence
feedly.com
0
0
0
"When it comes to strategic innovation, you're not searching for needles in haystacks anymore. You're scanning multiple haystacks for ice cubes, and they're melting."- Tino Klaehne, Director of Strategic Innovation & Intelligence. In his recent article ‘Strategic intelligence at
0
0
0
Trick or breach: Horror stories from CTI Analysts - happening this Wednesday🎃 Final chance to join our CTI Analysts as they share the breaches, oversights, and high-stakes incidents that changed how they approach CTI. What they will be covering: ✔️ Critical oversights that
0
0
1
Okay #FlowViz @feedly , this is cool! Tried linking the report we published from @TheDFIRReport on #SectopRat, and FlowViz smoothly created these visuals in less than 3 minutes. https://t.co/FwosF0sgqn
0
1
10
How do top #CTI teams stay ahead of relevant #cyberattacks? We asked our #ThreatIntelligence Advisors to share their secret: 6 Cyberattack Dashboard configurations that turn noise into actionable intelligence. We hope you enjoy these battle-tested views from CTI professionals
feedly.com
Examples on how to track relevant cyberattacks
1
1
5
As #AI integrates deeper into business workflows, so do the #threats targeting them. #AdversarialPrompts, or Indicators of Prompt Compromise (IoPCs) are emerging as a critical frontier in threat detection. They reveal attempts to exploit, abuse, or manipulate AI models, and most
0
0
5