Hi Max!
Yes, it does. If you search for a threat actor alias, the respective Insights Card will come up.
Don't hesitate in pinging ups if you have any further questions!
Posts by Feedly
A faster way to navigate #Feedly!
Hit Cmd+K (`Ctrl + K` on Windows) and instantly jump to any #threatactor, #CVE, #malwarefamily, AI Feed, Board, or recently viewed page.
Just type and go!
Learn more: feedly.com/new-features...
How should #CTI analysts communicate the value of human-led intelligence when AI adoption is reshaping expectations around speed and efficiency?
In case you missed it, Audra Streetman addresses this head on in her latest TI Essentials article ๐ feedly.com/ti-essential...
What's the best path to build #CTI skills that accelerate your career?
We're bringing together Audra Streetman, Baso Mtimkulu, Margherita Copioli for an honest conversation about certifications, non-traditional backgrounds, & the skills no training catalog teaches you.
feedly.com/cti-sessions...
What separates good cybercrime investigators from the rest?
They know how to score threat actor credibility. They know what to do with a crypto wallet when they find one. And they have law enforcement contacts built before they ever need them.
Read more:
Last tune for the day!
Now the real question...Which one's your favorite?
Feedly ThreatBeats: feedly.com/new-features...
#Cybersecurity #CTI #ThreatIntelligence
Because who doesn't want to listen to ShinyHunters activity as a broadway musical?
Feedly ThreatBeats: feedly.com/new-features...
#Cybersecurity #CTI #ThreatIntelligence
New #CVEs, #APT activity, and emerging campaigns. All of it. Just with a beat drop.
Feedly ThreatBeats: feedly.com/new-features...
#Cybersecurity #CTI #ThreatIntelligence
Feedly ThreatBeats: feedly.com/new-features...
The feature no one asked for, everyone needed. Your personalized daily #threatbrief, generated by #AI, delivered as a full track.
#Cybersecurity #CTI #ThreatIntelligence
We've been asking ourselves the hard questions at Feedly.
Do #CTI analysts really need another dashboard?
No.
Do they need #ransomware updates set to reggaeton?
Absolutely yes.
Introducing Feedly ThreatBeats: feedly.com/new-features...
#Cybersecurity #CTI #ThreatIntelligence
Our #API gives you programmatic access to #IntelAgents, Ask AI, AI Feeds, Boards, and the Real-Time Threat Graph so you can you can pull enriched, contextualized intelligence directly into your tools.
Here are 6 examples: feedly.com/new-features...
#ThreatIntelligence #CTI #CyberSecurity
#AI is changing #CTI quickly, so how do human analysts pitch their value?
Audra Streetman, Sr. #ThreatIntelligence Analyst at
Splunk says the value of human-led intel is in decisions improved and uncertainty reduced.
Read more and get a free AI integration template: feedly.com/ti-essential...
Most #CTI programs describe the threat. Few can prove their defenses hold against it.
Nigel Boston wrote the CTI Fusion Playbook for doing exposure validation across #ThreatHunting, #Detection, #RedTeam, and #SOC, with a scoring model and templates included.
feedly.com/ti-essential...
Tabletop exercises are only as good as the scenarios behind them.
When your scenarios are grounded in real adversary behavior, your team gets a genuine stress test.
Our next #CTI Session covers exactly how to make that happen.
๐ feedly.com/cti-sessions...
#threatintel #threatintelligence
New Feedly integration for #MicrosoftTeams!
Connect your #AI Feeds and Boards and automatically deliver:
โ Curated intel routed to the right channels and audiences
โ AI-generated summaries for faster triage
โ Translated and deduplicated intelligence
feedly.com/new-features...
#CTI #ThreatIntel
1 minute. 3 insights on building a #CTIcareer.
Now imagine the full hour.
We wrote up the highlights from our latest #CTI Session on promotions and pivots for career strategy: feedly.com/ti-essential...
You can now upload closed-source PDFs into Feedly and analyze them with Ask AI alongside your open-source feeds!
Threat Graph context.
Real-time enrichment.
One workflow.
โ feedly.com/new-features...
#CTI #ThreatIntelligence #Cybersecurity
Morgan Demboski, Senior #ThreatIntelligence Advisor at @sophossecurity.bsky.social, created the Tactical Decomposition Workflow to:
โ Clarify if a #TTP is actually โnovelโ
โ Identify gaps in controls or detections
โ Provide concrete defensive guidance to stakeholders
feedly.com/ti-essential...
#Cybercrime isn't slowing down, and neither should your investigation skills.
Join our next #CTI Session on Wed, Mar 4th.
Our guests will break down the latest cybercrime trends, real investigation tradecraft, and how to build your CTI career.
๐ feedly.com/cti-sessions...
Plus, weโre sharing a free, ready-to-use #promptguide designed specifically for #CTI teams: feedly.com/ti-essential...
#AIprompting for #CTI isn't static, what worked last year is already changing.
Our team broke down what's shifted in CTI prompting best practices and highlighted new use cases.
Here are the most practical insights from the session: feedly.com/ti-essential...
Practical advice on #CTI career strategy by practitioners who've actually been through it.
Weโll cover:
โ
The analyst-to-manager transition
โ
Ladder vs. lattice career paths
โ
Practical frameworks to map out your next move today
Join us: feedly.com/cti-sessions...
The main problem with #DDW monitoring is thereโs too much noise and too little structure.
Mary D'Angelo breaks down how #CTI teams can turn DDW chaos into a repeatable intelligence workflow.
Article includes free Collection Policy and SOP templates!
feedly.com/ti-essential...
Researching a #cyberattack shouldn't mean bouncing between 30 tabs.
Cyberattack Insights Cards give you the full context in one place, and it updates automatically as new intel emerges.
Learn more: feedly.com/new-features...
How to pitch #CTI to leaders: A new approach to #threatintel business cases
"Leaders won't fund information for the sake of information, but they will fund clarity & prioritization." - Gert-Jan Bruggink, Founder & CEO of Venation on building CTI business cases.
feedly.com/ti-essential...
Advanced AI prompting for CTI: From theory to practice
Join us as we share prompting techniques our team has learned working directly with CTI teams on real-world AI applications.
๐
Feb 11 - 9:00AM PST
feedly.com/cti-sessions...
We asked 14 #CTI practitioners to share their forecasts, workflow priorities, & metrics heading into 2026, then brought four of them together to talk about it live.
Recap ๐ feedly.com/ti-essential...
Thanks to Will Thomas, Mary DโAngelo, Freddy Murre, & Marcelle Lee for joining #CTISessions Ep 16.
Two #CVEs can both have a #CVSS score of 9.8, but one requires physical access while the other is remotely exploitable.
CVSS vector data shows you that difference & the Vulnerability Agent makes it easy to filter by it.
Here are 7 filter combinations to get you started: feedly.com/new-features...
A huge thank you to everyone who contributed their insights!
If you work in CTI, we'd love to hear from you, how would you answer these questions?
Make sure to check out the full guide here ๐ bit.ly/feedlyroundu...
John E. Stoner, Cybersecurity Consultant, Instructor, and #Cybersecurity professional with over 25 years of experience, including a decade in the U.S. Army specializing in Signals Intelligence (SIGINT) and 15 years focused on #CyberThreatIntelligence.
Full guide๐ย bit.ly/feedlyroundu...