Introducing Feedly for Cybersecurity

Streamline your open-source intelligence

150,000 cybersecurity professionals use Feedly to keep up with the latest security news and research insights about critical threats (vulnerabilities, malware, data breaches, threat actor groups, etc.)

Cybersecurity is a game of foresight. It is a chessboard where hackers and defenders are looking to checkmate each other.

Learning more about the tactics, techniques, and procedures used by hackers can help you better prepare against them, saving you the cost and headaches that come with a breach or attack. The cost of ransomware attacks in the U.S. surpassed $7.5 billion in 2019.

But information gathering is tedious: hundreds of new articles and tweets need to be reviewed and triaged every day. Finding critical threats in that sea of information is time-consuming and overwhelming.

Today, we’re excited to launch Feedly for Cybersecurity: a collection of integrations and Leo models that help you cut through the noise, break barriers between team silos, and streamline your threat intelligence.

Leo is your AI research assistant. Ask him to read your security feeds and prioritize what matters to you:

Vulnerabilities, CVE, CVSS, and Exploits
Malware, adware, ransomware, bots, …
Threat actor groups
API

Leo understands malware threats

Research and prepare for the latest malware threats without the information overload

Cybersecurity is a game of foresight. It’s a chessboard on which attackers and defenders are constantly looking for checkmate. 

Hackers launch a new ransomware attack every 14 seconds. They’re increasingly more capable and sophisticated. Learning how they plan attacks, what techniques they use, and who they’re targeting, can make you so much better prepared. You’ll save the cost and headache of a cyber assault too. This is especially important considering that the cost of ransomware attacks in the U.S. alone surpassed $7.5 billion in 2019.

But investigating malware threats is tedious. Hundreds of new articles and tweets need to be reviewed and triaged every day. Finding critical threats in that sea of information is time-consuming and overwhelming.

We want to help you streamline your tactical and operational open-source intelligence, so that you can better protect your environment.

That’s why we’ve taught Leo, your AI research assistant, to recognize malware threats. You can ask him to read your security feeds and prioritize what’s relevant to you, your sector, and your environment.

Let’s imagine that you work in a threat intelligence team and are responsible for researching and analyzing the threat landscape. You’re particularly interested in evolving malware threats (including ransomware and malvertisement).

Cut through the noise

You can train Leo to read your Security News feed and prioritize articles related to malware.

Leo prioritizes malware articles in your Security News feed

Leo continuously reads the thousands of articles published in those feeds. It’s an efficient way to cut through the noise and keep up with the evolving malware landscape without the overwhelm.

You’re in control

Leo has been trained to understand broad topics like malware, as well as hundreds of specific malware types like malvertisement, ransomware, adware, bots, rootkits, spyware, etc.

Asking Leo to prioritize malware in your Security News feed is as simple as creating a new Topic priority and selecting ‘malware’ as the topic.

Ask Leo to prioritize malware threats in your Security News feed

You can combine topics with +AND and +OR and create even more targeted priorities for Leo. For example, use +AND to focus on malware related to Android or top companies in your sector.

Refine the priority to malware and Android

You can also ask Leo to look for a specific type of malware like malvertisement or ransomware.

Prioritize ransomware threats

Continuously learning and getting smarter

Leo is smart. He continuously learns from your feedback. When Leo is wrong, you can use the ‘Less Like This’ down arrow button to let him know that an article he’s prioritized isn’t about malware.

Let Leo know when he’s wrong

Break down silos

Bring your research team into the picture. They can create a Threat Intel Report Board and save the most critical insights they discover in their Feedly. Then everyone with the same Board can leave notes and highlight the biggest threats. 

We’ve seen teams create tactical and operational Boards. For instance, a Vulnerability Report can be built up with information for those that deal with security procedures, while strategic CISO Newsletters can keep management up to speed about malware and your planned response.

Articles bookmarked in a Board can be shared with the rest of the team via daily newsletters, Slack and Microsoft Teams notifications, or pushed to other apps using the Feedly Cybersecurity API.

Share the threat intelligence you collect in Feedly with other teams and apps

Streamline your open-source intelligence

We’re excited to see how your security team will declutter your feeds and dig deeper into the critical threats that matter to you. Sign up today and discover Feedly for Cybersecurity.

If you’re interested in learning more about Leo’s roadmap, you can join the Feedly Community Slack channel. 2020 will be a thrilling year with new skills and bold experiments!

Leo understands threat actor groups

Research threat actor groups and learn more about their tactics, techniques, and procedures without the overwhelm

Cyber attacks continue to wreak havoc around the world. The actors waging these wars don’t just care about fraud either. They’re part of criminal organisations. Foreign governments stealing data for defense or national interests. Even terrorists or activists driven to disrupt and cause harm. 

What’s more, they’re increasingly capable and sophisticated. It’s a growing threat that can strike anyone at any time.

When you learn about threat actors’ tactics and motivations, you can better prepare against them, saving you the costs and headaches that come with a breach or attack. 

But there’s so much content to wade through when investigating these threat actors. It’s like fishing blind in an ocean. You’ll never know what’s coming back on the hook. More time and stress is spent on finding information about the threat, rather than acting on it. You can be overwhelmed. 

We’re passionate about helping you refine and streamline your open-source intelligence. That’s why we’ve taught Leo, your AI research assistant, to recognize threat actor groups. He can find them in your Feedly security feeds, prioritizing articles related to the actors and sectors you care about.

Let’s imagine that you work in the telecommunications sector, and you’re researching the tactics and motivations of MuddyWater, an Iranian threat actor group.

Cut through the noise

You can train Leo to read all your cybersecurity, foreign affairs, and cyber warfare sources, and prioritize articles related to MuddyWater.

Prioritize a threat actor

Leo continuously reads the articles in your feeds and prioritizes the ones that mention MuddyWater (or any of its aliases). It’s a powerful and effective way to keep up with their latest techniques, tactics, and procedures.

You’re in control

Leo has been trained to recognize all the threat actor groups referenced by the MITRE ATT&CK framework. This is a list of common names for hacking groups, as recognized by the global security community.

Asking Leo to prioritize MuddyWater in your security feed is as simple as creating a new Topic priority and selecting ‘MuddyWater’ as the topic.

Enter a threat actor alias in the topic field

When you prioritize MuddyWater, Leo will also look for other synonyms for that group like Seedworm and TEMP.Zagros.

You can combine topics with +AND and +OR to create even more targeted priorities for Leo. For example, use +AND to combine an actor group with an attack vector or a sector. This narrows his focus further so you find exactly what you’re looking for.

Continuously learning and getting smarter

Because Leo is integrated with the MITRE ATT&CK framework, it’s continuously learning and getting smarter. As new groups or aliases are identified, they’ll be automatically updated in your Feedly.

Leo recognizes threat actor groups listed on the MITRE ATT&CK framework

Break down silos

As you search and discover new content, share insights with your research team. Together, you can create a Threat Intel Report Feedly Board and bookmark the most critical insights you discover. You can also add notes and highlights about why a threat is high-priority.

We’ve already seen security teams create tactical Boards, such as a Vulnerability Report, to share with their operations experts. You might also want to build a CISO Newsletter to keep your management updated. It’s all possible within Feedly.  

Articles bookmarked in a Board can be shared with the rest of the team via daily newsletters, Slack or Microsoft Teams notifications, or pushed to other apps using the Feedly Cybersecurity API.

Share the threat intelligence you collect in Feedly with other teams and apps

Streamline your open-source intelligence

We’re excited to see how your security team will declutter your feeds and dig deeper into the critical threats that matter to you. Sign up today and discover Feedly for Cybersecurity.

If you’re interested in learning more about Leo’s roadmap, you can join the Feedly Community Slack channel. 2020 will be a thrilling year with new skills and bold experiments!

BOXER PANTS

昇華プリントで総柄のグラフィックを施したオリジナルボクサーパンツ。 程よいフィット感はもちろんのことブランドの特徴を活かしたデザイン性がおすすめなアイテムとなっております。 素材:ポリエステル 100% サイズ:S,M,L,XL,XXL カラー:BLACK,WIHTE1(BUG),WAPPEN,WHITE2(32)
ウエスト総丈前股上わたり
S: 59cm 24cm 18.5cm 22cm
M: 65cm 24.5cm 19cm 23cm
L: 71cm 25cm 19.5cm 24cm
XL: 77cm 25.5cm 20cm 25cm
XXL: 83cm 26cm 20.5cm 26cm

 (約/cm)

SHORT PANTS

水陸両用に着用できるナイロンショートパンツ(メッシュ素材のインナーパンツ付)。 シンプルなデザイン性に加え、止水のファスナーポケットを施すなどディティールも備わったアイテム。 素材:ナイロン 100% サイズ:S,M,L,XL,XXL カラー:BLACK,CHARCOAL,BLUE GRAY
ウエストヒップ前股上股下
S: 68cm 103cm 24.5cm 14.5cm
M: 71cm 106cm 25.5cm 15.5cm
L: 74cm 109cm 26.5cm 16.5cm
XL: 77cm 112cm 27.5cm 17.5cm
XXL: 80cm 115cm 28.5cm 18.5cm

 (約/cm)

GRAPHIC SHIRTS

昇華プリントを施した総柄パターンの開襟シャツ。 吸汗速乾性の高いポリエステル素材を使用し、肌触りが良いストレスフリーなサマーアイテムとなっております。 素材:ポリエステル 100% サイズ:S,M,L,XL,XXL カラー:BLACK,BLUE CAMO,WHITE1(BUG),WAPPEN,WHITE2(32)
着丈袖丈身幅肩幅
S: 65cm 18.5cm 47cm 40cm
M: 72cm 21cm 51cm 43cm
L: 74cm 22cm 54cm 46cm
XL: 76cm 23cm 57cm 49cm
XXL: 76cm 23cm 60cm 52cm

 (約/cm)

NTN CARGO SHORT PANTS

【NEW TYPE NEO】ナイロン素材を使用したカーゴショートパンツ。 計7つのポケットを要しギミックのかかったデザインが特徴的です。 レーザー圧着やフラップ式、右裾のカーゴポケットはミニポケットとの二層構造など多種多様のサイズを配置しております。 素材:ナイロン 100% サイズ:S,M,L,XL,XXL カラー:BLACK
ウエストヒップ前股上股下
S: 80cm 104cm 25cm 25.5cm
M: 83cm 107cm 26cm 26.5cm
L: 86cm 110cm 27cm 27.5cm
XL: 89cm 113cm 28cm 28.5cm
XXL: 92cm 116cm 29cm 29.5cm

 (約/cm)

NTN AUTHENTIC UNIFORM

【NEW TYPE NEO】黄金期と呼ばれることも多い90年代のサッカーユニフォームを彷彿とさせるアイテム。 切替の昇華パターンでギミックの効いたデザイン性、メッシュやリブなど異素材を組み合わせたディティールが特徴のハイクオリティユニフォームとなっております。 素材: ポリエステル 100% サイズ:S,M,,L,XL カラー:BLACK
着丈裄丈身幅袖口幅
S: 71cm 50cm 50.3cm 15cm
M: 72cm 51cm 53.3cm 15.5cm
L: 74cm 52cm 56.3cm 16cm
XL: 76cm 53cm 59.3cm 16.5cm

 (約/cm)

NTN HIGH SPEC TEE

【NEW TYPE NEO】見た目はコットンさながら吸水速乾性に優れたポリエステル100%の開発素材を使用したハイスペックTシャツ。 シンプルなグラフィックパターンを施した汎用性の高いアイテムとなっております。 素材: ポリエステル 100% サイズ:S,M,,L,XL カラー:BLACK,WHITE
着丈袖丈身幅肩幅
S: 72cm 22.5cm 52cm 46cm
M: 73cm 23.5cm 55cm 48.5cm
L: 75cm 24.5cm 58cm 51cm
XL: 77cm 25.5cm 61cm 53.5cm

 (約/cm)

NTN ATHLETIC VEST

【NEW TYPE NEO】レイヤードアイテムとして幅広く支持されているベスト。 タクティカルベストを彷彿とさせる多数のポケットが取り付けられているのがディティールの特徴。 裏返すことにより後ろ身のファスナーポケットに収納が可能なポケッタブル仕様となっております。 メッシュ素材との切替デザインがモードなスタイルにもハマる一着。 素材: ナイロン 100% サイズ:S,M,,L,XL,XXL カラー:BLACK
着丈アームホール身幅肩幅
S: 65cm 24cm 53cm 42.5cm
M: 67cm 25cm 56cm 45cm
L: 69cm 26cm 59cm 47.5cm
XL: 71cm 27cm 62cm 50cm
XXL: 73cm 28cm 65cm 52.5cm

 (約/cm)

NTN POCKET OVER SHIRTS

【NEW TYPE NEO】ナイロン素材を使用したオーバーサイズシルエットシャツ。 速乾性に優れるカジュアル素材ながら程よく光沢感のあるエレガンスさが印象的。 左胸のメッシュポケットはレーザー圧着のファスナー仕様、裾のドローコードでシルエットにも変化を加えられるなど細かなディティールも特徴です。 素材: ナイロン 100% サイズ:S,M,,L,XL カラー:BLACK
着丈袖丈身幅肩幅
S: 67cm 25cm 66cm 52.5cm
M: 68cm 26cm 69cm 55cm
L: 70cm 27cm 72cm 57.5cm
XL: 72cm 28cm 75cm 60cm

 (約/cm)