By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
DaltonitDaltonitDaltonit
Search
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: Quickly discover and collect indicators of compromise from millions of sources daltonit
Share
Sign In
Notification Show More
Font ResizerAa
DaltonitDaltonit
Font ResizerAa
Search
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
TECH NEWS

Quickly discover and collect indicators of compromise from millions of sources daltonit

Dalton
Last updated: 7:33 am
Dalton
Share
8 Min Read
SHARE


Contents
Collect IoCs from across the entire webFind and export indicators of compromiseFind IoCs related to a specific threat actor or malwareFind and export IoCs and their contextAutomate your IoC collection process with the Feedly APIFind relevant IoCs previously published onlineFind and export indicators of compromise

Finding and collecting relevant indicators of compromise is critical to your security, but with millions of articles to sort through, discovering and collecting the right ones is a challenge. Even if you know where to look, IoCs can be easy to miss and tedious to upload to your threat intelligence platform.

This is why we’re excited to announce that now you can discover, collect, and export malicious IPs, domains, hashes, and URLs mentioned in your Feeds or across the web, because Feedly AI recognizes indicators of compromise.

We trained Feedly AI to understand, find, and even export IoCs, so that they are easier to find and prioritize. This feature is included with Feedly for Cybersecurity.

Being able to track IoCs with Feedly has been very helpful, our team has been using the new feature every day to be on top of potential risks. Just today, Feedly AI was able to spot three IoCs in a long report I was reading although I hadn’t noticed them.

Michelle Barro, Threat Intelligence Analyst at Verizon

Collect IoCs from across the entire web

Feedly AI recognizes malicious IPs, domains, hashes, and URLs within the text of articles, Tweets, or Reddit posts, and tags articles so you know how many and what type of IoCs appear in a given article.

When an article contains an IoC, Feedly AI will highlight it for you so it’s easy for you to find and confirm, even if it is buried in the text of a long article or threat intelligence report.

If the IoCs are relevant, you can export them to a markdown or STIX file that will include critical context such as the article link, malware, threat actor, CVE, product, and TTP information.

To track indicators of compromise from across the entire web, click the robot symbol on the left hand navigation menu, and navigate to the ‘Threat Intel” tab. Type “Indicators of Compromise,” then click “+ AND” to refine your AI Feed further if needed.

Now that I can use Feedly to track IoCs across the web, our process to upload new indicators to our environment is much faster and easier. Being able to track IoCs across millions of sources on the web helps us cover every base possible.

Cybersecurity engineer at a leading Fortune 500 technology company

Find and export indicators of compromise

Feedly for Cybersecurity is an OSINT platform used by more than 100 cybersecurity teams globally to speed up their threat intelligence. See how Feedly can help you conduct threat research up to 70% faster by starting a free trial.

START 30 DAY TRIAL

Find IoCs related to a specific threat actor or malware

Let’s say you want to search for indicators of compromise related to a specific threat actor or malware. You can use AI Feeds to flag IoCs that match your query, even if the articles are from sources you don’t specifically follow.

The AI Feed shown in the example below will look for IoCs related to the Cobalt Strike malware family, making it easy to find what’s relevant, export it in seconds, and proactively monitor the web for future IoCs relevant to you.

Find and export IoCs and their context

When you open article(s) that contain IoCs you’d like to upload to your preferred threat intelligence platform, you can export them in either STIX or Markdown formats. This is a significant time saver in contrast to scrolling through the article and copying and pasting what you need.

Your export will also include the IoC context such as the original article link, related malware, threat actor, CVE, product, and TTP information. This makes it even easier to take action. Here is an example of a STIX export:

Automate your IoC collection process with the Feedly API

The Advanced Feedly for Cybersecurity plan includes up to 100,000 requests per month and the full power of the Feedly API. Any action a user is taking in the Feedly application can be performed via the Feedly API, including collecting IoCs. You can access instructions for doing so here.

You can use the Feedly API to aggregate indicators of compromise and their context (associated threat actors, malwares, vulnerabilities and TTPs) from recent articles in a Feed, and return a single STIX object with all of those components and their relationships.

To learn more about the power of the Feedly API or begin a trial or proof of context, click here.

“It used to be particularly tedious to track the IoCs that are related to the critical UI CVEs or products my team has to be on top of. Now, with Feedly’s new IoC feature, I can track IoCs in a much faster and more visible way.”

Michael Rossi, Independent Security Consultant

Find relevant IoCs previously published online

Finally, if you need to search for a specific set of IoCs already published online, you can do this via Power Search. Power Search allows you to leverage Feedly AI’s knowledge graph within your existing Feeds or across the web, allowing you to get much more granular and accurate than standard web searches.

Click the “?” icon in the left navigation menu to access the Power Search screen. From here, you can look for any articles that contain indicators of compromise. This is ideal when you need to track a malware family you haven’t tracked before, and want to quickly find known IoCs that are already available online.

The Indicators of Compromise feature, CVE dashboard, cyber attacks Smart Topic, and several more advanced features are included with Feedly for Cybersecurity. This enterprise package is perfect for cybersecurity teams that need to conduct open-source threat intelligence more efficiently. To learn more about any of these features, or start a free 30-day trial, click the link below.

Find and export indicators of compromise

Feedly for Cybersecurity is an OSINT platform used by more than 100 cybersecurity teams globally to speed up their threat intelligence. See how Feedly can help you conduct threat research up to 70% faster by starting a free trial.

START 30 DAY TRIAL


Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article Pin your favorite sources and boards at the top of your left navigation daltonit
Next Article Use this pro tip to instantly send articles from Feedly to external recipients – Feedly Blog daltonit
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Which could be 2025’s breakout millionaire maker? daltonit
  • SUI crypto surges over 30% as meme coins gain traction daltonit
  • Aptos Foundation invests in Universal Health Token to advance decentralized healthcare daltonit
  • Prompt engineering: conduct a Diamond Model of Intrusion Analysis daltonit
  • US court permits Three Arrows Capital to expand claim against FTX, rejects FTX’s objections daltonit

Recent Comments

  • Connor on Here’s Why Business Needs a Mobile-Friendly Website
  • Connor on Here’s Why Business Needs a Mobile-Friendly Website
  • Connor on Here’s Why Business Needs a Mobile-Friendly Website

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • Which could be 2025’s breakout millionaire maker? daltonit
  • SUI crypto surges over 30% as meme coins gain traction daltonit
  • Aptos Foundation invests in Universal Health Token to advance decentralized healthcare daltonit
  • Prompt engineering: conduct a Diamond Model of Intrusion Analysis daltonit
  • US court permits Three Arrows Capital to expand claim against FTX, rejects FTX’s objections daltonit

Search

Follow US
Daltonit. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Not a member? Sign Up