IGF Mauritius

Internet Governance Forum Mauritius

threat intelligence

cybersecurity-only Star feature threat intelligence

Scale up MISP: Automatically collect and ingest IoCs with Feedly TI

Threat IntelligenceScale up MISP: Automatically collect and ingest IoCs with Feedly TIIncludes rich context like threat actors, malware, vulnerabilities, and TTPs15-second summaryMISP is a powerful platform for storing and distributing cyber threat intelligence, including indicators of compromise (IoCs). However, without…

cybersecurity-only Star feature threat intelligence

Know your enemy: Collect and share threat actor intelligence

Threat IntelligenceKnow your enemy: Collect and share threat actor intelligenceTTPs, IoCs, Malware, MITRE ATT&CK15-second summaryThreat actor groups number in the hundreds, are well-resourced, and employ highly evolved tactics and techniques. Knowing which threat actors are targeting your industry and their…

cybersecurity-only Star feature threat intelligence

Collect and share actionable malware intelligence with Feedly AI Feeds

Threat IntelligenceCollect and share actionable malware intelligence with Feedly AI FeedsIdentify IoCs, TTPs, threat actors, and more to share with your team and toolsThere are over one billion malware software programs in existence today. How do you discover, monitor, and…

cybersecurity-only Star feature threat intelligence

Track Detection Rules Across the Web with Feedly AI

Threat IntelligenceTrack Detection Rules Across the Web with Feedly AIAutomatically collect and download Sigma, Yara, Snort, and Microsoft hunting queries with Feedly AIMillions of security threats could potentially impact your business on any given day. Manual approaches to detection and…

threat intelligence

Feedly Best Practices for CTI Teams

Threat IntelligenceFeedly Best Practices for CTI Teams Optimize your team’s workflows with Feedly for Threat IntelligenceHow do Cyber Threat Intel (CTI) teams collaborate within Feedly to increase productivity and reduce blindspots? In this post, we’ll discuss some of the best…

threat intelligence

Discover Proof of Exploits Early with Feedly

Threat IntelligenceDiscover Proof of Exploits Early with FeedlyAccelerate your research into the status of vulnerabilitiesDoes your team track emerging exploits across cybersecurity websites, code repositories, and social media sites?We just released a new Proof of Exploit AI Model that I…

Discover proof of exploits early

Threat Intelligence Track emerging exploits across the Web with Feedly’s AI Engine Does your team track emerging exploits across cybersecurity websites, code repositories, and social media sites? We just released a new Proof of Exploit Leo Concept that I think…

Track emerging threats with Feedly AI

Threat Intelligence Speed up your open-source threat intelligence by 70% with (Feedly) AI Feeds The core of Feedly for Threat Intelligence is an AI engine, that automatically gathers, analyzes, and prioritizes intelligence from millions of sources in real-time. In this…

Track emerging threats with Leo, Feedly’s AI Engine

Threat Intelligence Speed up your open-source threat intelligence by 70% with Leo Web Alerts The core of Feedly for Threat Intelligence is an AI engine, called Leo, that automatically gathers, analyzes, and prioritizes intelligence from millions of sources in real-time….

threat intelligence

Track specific CVEs with Feedly AI

Threat IntelligenceTrack specific CVEs with Feedly AITrack specific CVE IDs to monitor for exploits, attacks, or track intelligence reports mentioning the CVELooking to monitor a specific CVE ID? Previously, you had to type in the exact CVE ID and be…