Discover proof of exploits early
Threat Intelligence Track emerging exploits across the Web with Feedly’s AI Engine Does your team track emerging exploits across cybersecurity websites, code repositories, and social media sites? We just released a new Proof of Exploit Leo Concept that I think…
New: Track specific CVEs in Feedly
What’s New Leo now autocompletes specific CVE IDs so you can monitor for exploits or attacks, or track threat intelligence reports mentioning the CVE Looking to monitor a specific CVE ID? Previously, you had to type in the exact CVE…
Biden’s Alliance for the Future of the Internet: Mandate for a Split?
Representatives of the Biden administration are now saying that its “Alliance for the Future of the Internet” will be launched “in coming weeks.” Despite our earlier article indicating that the initiative might have some promise, the more we’ve heard, the…
Quickly discover and collect indicators of compromise from millions of sources
Leo recognizes IoCs mentioned in articles, and can gather them for you Finding and collecting relevant indicators of compromise is critical to your security, but with millions of articles to sort through, discovering and collecting the right ones is a…
How Airbus CyberSecurity gets actionable cyber threat intelligence to customers in minutes
Case Study An inside look at how the Airbus CyberSecurity team is using Feedly to monitor and share actionable insights ImpactA cohesive, streamlined workflow for threat intelligence that saves hours every weekIncreased customer satisfaction due to improved speed of intelligenceReal-time…
Using AI to sort technical updates from news commentary during the SolarWinds attack: A case study
Case Study How one cybersecurity analyst leveraged Feedly to proactively evaluate news around the breach and protect his company and their clients and stakeholders Back in 2020, it wasn’t hard to find information about the SolarWinds breach. In fact, the…
How a WillowTree cybersecurity analyst gathers threat intelligence in just 30 minutes a day
Case Study Drew Gallis, analyst at WillowTree, leverages Feedly for Cybersecurity to track cyber threats across the company’s supply chain and protect clients ImpactKeeps track of critical vulnerabilities in the supply chain so he can react quickly.Went from spending 2-3…
Chinese Data Nationalism Targets Didi Platform
A week after the close of our conference comparing platform governance in the US and China, the Chinese government took another strong action to subordinate one of its major private platform companies. This time it was Didi Chuxing, China’s dominant…
Easily track cyber attacks across your industry and supply chain
New Feature Leo understands all types of cyber attacks and can track them for you The only constant in the realm of cyber security is change; hackers are continuously maturing and becoming more sophisticated, attack patterns are constantly evolving, and…
Research critical vulnerabilities with the Leo CVE Dashboard
New Feature Contextualized CVE information for faster threat research, without the overwhelm Cyber attacks are increasing in volume and sophistication across every industry and category, leaving threat analysts and frontline security teams faced with a flood of information. The consequences…