Now 4 are joining us live to discuss what we learned:
→ Will Thomas, Sr. #TI Advisor
→ Mary D'Angelo, CTI Sr Team Lead
→ Freddy Murre, Sr TI Analyst
→ Marcelle Lee, CTI Researcher
feedly.com/cti-sessions...
Now 4 are joining us live to discuss what we learned:
→ Will Thomas, Sr. #TI Advisor
→ Mary D'Angelo, CTI Sr Team Lead
→ Freddy Murre, Sr TI Analyst
→ Marcelle Lee, CTI Researcher
feedly.com/cti-sessions...
Sam Flockhart, Head of #CyberThreatManagement, gets this, and many questions all the time. With 14+ years in the space, he's mapped out the answers, with bonus insights from John Doyle.
🔗 feedly.com/ti-essential...
Sam Flockhart, Head of #CyberThreatManagement, gets this, and many questions all the time. With 14+ years in the space, he's mapped out the answers, with bonus insights from John Doyle.
🔗 feedly.com/ti-essential...
Feedly’s enhanced IoC capabilities automate context enrichment across #threatactors, #malware, #cyberattacks, and more indicator types, including SHA-1, SHA-256, MD5 hashes, and IPv6 addresses.
Full breakdown 👇
feedly.com/new-features...
Feedly’s enhanced IoC capabilities automate context enrichment across #threatactors, #malware, #cyberattacks, and more indicator types, including SHA-1, SHA-256, MD5 hashes, and IPv6 addresses.
Full breakdown 👇
feedly.com/new-features...
The new Top Stories sort streamlines this.
Sort an #AI Feed or Folder by Top Stories, and Feedly AI will place the most widely reported stories first.
feedly.com/new-features...
The new Top Stories sort streamlines this.
Sort an #AI Feed or Folder by Top Stories, and Feedly AI will place the most widely reported stories first.
feedly.com/new-features...
@aaroncti.bsky.social, breaks down a practical framework for using #AttackSurfaceIntelligence to proactively reduce organizational risk.
🔗 feedly.com/ti-essential...
@aaroncti.bsky.social, breaks down a practical framework for using #AttackSurfaceIntelligence to proactively reduce organizational risk.
🔗 feedly.com/ti-essential...
Start 2026 strong by joining our upcoming #CTISession, and meet 6 of our #ThreatIntelligence Advisors as they share practical workflows they've developed while working with enterprise clients.
📅 January 14 ⏰ 9:00 AM PST
👉 feedly.com/cti-sessions...
Start 2026 strong by joining our upcoming #CTISession, and meet 6 of our #ThreatIntelligence Advisors as they share practical workflows they've developed while working with enterprise clients.
📅 January 14 ⏰ 9:00 AM PST
👉 feedly.com/cti-sessions...
Adam Goss wrote a practical guide on using the CTI-CMM.
Inside:
→ 60 day sprint to reach CTI2
→ Examples & tool recommendations
→ Stakeholder discovery template
→ Building a business case for resources
feedly.com/ti-essential...
Adam Goss wrote a practical guide on using the CTI-CMM.
Inside:
→ 60 day sprint to reach CTI2
→ Examples & tool recommendations
→ Stakeholder discovery template
→ Building a business case for resources
feedly.com/ti-essential...
Key lessons from Paul’s webinar, plus highlight clips + an OpenSourceMalware demo.
Topics covered:
- Riskiest open-source ecosystems
- How malicious packages evade detection
- Extracting threat intel from packages
5 takeaways + resources at the end. feedly.com/ti-essential...
Key lessons from Paul’s webinar, plus highlight clips + an OpenSourceMalware demo.
Topics covered:
- Riskiest open-source ecosystems
- How malicious packages evade detection
- Extracting threat intel from packages
5 takeaways + resources at the end. feedly.com/ti-essential...
Marcelle Lee got that popup and turned it into a full #threatinvestigation uncovering 114 malicious domains and fake #antivirus apps.
Her step-by-step guide shows how to investigate scareware campaigns using only free tools.
👉 feedly.com/ti-essential...
Marcelle Lee got that popup and turned it into a full #threatinvestigation uncovering 114 malicious domains and fake #antivirus apps.
Her step-by-step guide shows how to investigate scareware campaigns using only free tools.
👉 feedly.com/ti-essential...
👉 CTI without threat hunting is like having a map nobody uses.
👉 You need both.
Will Thomas, Senior Threat Intelligence Advisor just released a new article for Feedly’s TI Essentials blog: How to fuse #CTI with #threathunting.
👉 CTI without threat hunting is like having a map nobody uses.
👉 You need both.
Will Thomas, Senior Threat Intelligence Advisor just released a new article for Feedly’s TI Essentials blog: How to fuse #CTI with #threathunting.
We’re hosting a webinar with special guest Paul McCarty, Founder of OpenSourceMalware, who will share insights from tracking malicious packages across multiple ecosystems.
events.zoom.us/ev/Ao5Slehow...
We’re hosting a webinar with special guest Paul McCarty, Founder of OpenSourceMalware, who will share insights from tracking malicious packages across multiple ecosystems.
events.zoom.us/ev/Ao5Slehow...
12 new enterprise techniques ⇒ 12 new Feedly AI Models are ready to track them across your threat intelligence feeds and find relevant intelligence faster.
feedly.com/ti-essential...
12 new enterprise techniques ⇒ 12 new Feedly AI Models are ready to track them across your threat intelligence feeds and find relevant intelligence faster.
feedly.com/ti-essential...
Paul Prouse, Owner of Astro Intelligence, breaks down how to advance from good to great leadership in intelligence, and it's not just technical expertise.
Read the full piece👇
feedly.com/ti-essential...
#CTI #Cybersecurity
Paul Prouse, Owner of Astro Intelligence, breaks down how to advance from good to great leadership in intelligence, and it's not just technical expertise.
Read the full piece👇
feedly.com/ti-essential...
#CTI #Cybersecurity
Our #CTI Advisor built an #AI Prompt that generates ready-to-send phishing awareness newsletters for your organization👇
feedly.com/new-features...
Our #CTI Advisor built an #AI Prompt that generates ready-to-send phishing awareness newsletters for your organization👇
feedly.com/new-features...
events.zoom.us/ev/AqvpxjA2Y...
events.zoom.us/ev/AqvpxjA2Y...
✅ Signal pairing that validates patterns
✅ Real-time intelligence that shapes decisions
✅ AI-powered detection that surfaces what you'd otherwise miss
✅ Signal pairing that validates patterns
✅ Real-time intelligence that shapes decisions
✅ AI-powered detection that surfaces what you'd otherwise miss
In his latest article, CTI Director Brian Mohr breaks down why CTI teams should start managing intelligence like the decision-support project it's always been.
🔗 feedly.com/ti-essential...
In his latest article, CTI Director Brian Mohr breaks down why CTI teams should start managing intelligence like the decision-support project it's always been.
🔗 feedly.com/ti-essential...
The biggest takeaway? Creating safe spaces for these conversations helps the entire community avoid repeating the same mistakes, & builds stronger security teams in the process.
feedly.com/ti-essential...
The biggest takeaway? Creating safe spaces for these conversations helps the entire community avoid repeating the same mistakes, & builds stronger security teams in the process.
feedly.com/ti-essential...
We’re excited to introduce the Startup Innovation Radar - your real-time window into startups in any market. Created to speed up discovery and analysis of startups in natural language, even pre-funding.
feedly.com/new-features...
We’re excited to introduce the Startup Innovation Radar - your real-time window into startups in any market. Created to speed up discovery and analysis of startups in natural language, even pre-funding.
feedly.com/new-features...
Check out John E. Stoner’s new article on Feedly’s TI Essentials blog on the 3 core characteristics of high-quality threat intelligence.
feedly.com/ti-essential...
Check out John E. Stoner’s new article on Feedly’s TI Essentials blog on the 3 core characteristics of high-quality threat intelligence.
feedly.com/ti-essential...
Final chance to join our CTI Analysts as they share the breaches, oversights, and high-stakes incidents that changed how they approach CTI.
us02web.zoom.us/webinar/regi...
Final chance to join our CTI Analysts as they share the breaches, oversights, and high-stakes incidents that changed how they approach CTI.
us02web.zoom.us/webinar/regi...
We asked our #ThreatIntelligence Advisors to share 6 Cyberattack Dashboard configurations that turn noise into actionable intelligence.
Here are the battle-tested views: feedly.com/new-features...
We asked our #ThreatIntelligence Advisors to share 6 Cyberattack Dashboard configurations that turn noise into actionable intelligence.
Here are the battle-tested views: feedly.com/new-features...
Join Threat Researcher, Thomas Roccia for a deep dive into adversarial prompts and how to defend against these threats using open-source tools.
us02web.zoom.us/webinar/regi...
Join Threat Researcher, Thomas Roccia for a deep dive into adversarial prompts and how to defend against these threats using open-source tools.
us02web.zoom.us/webinar/regi...