Track emerging threats with Leo, Feedly’s AI Engine

The core of Feedly for Threat Intelligence is an AI engine, called Leo, that automatically gathers, analyzes, and prioritizes intelligence from millions of sources in real-time.

In this article, we’ll show you how to use Leo to:

Monitor critical vulnerabilities and zero-daysResearch the behavior of specific threat actors and malware familiesUnderstand the threat landscape around your industryTrack niche cybersecurity topics

Before we look at those four use cases, let’s start with a short overview of how Leo works.

Meet Leo, Feedly’s AI Engine

Leo reads millions of articles, reports, and social media posts every day and automatically tags key threat intelligence concepts: critical vulnerabilities, malware families, threat actors, indicators of compromise, ATT&CK techniques, companies, vendors, industries, etc.

Feedly’s AI Engine (Leo) automatically tags key threat intelligence concepts

All this information is at your fingertips in near real-time via a powerful and intuitive search and tracking interface called Leo Web Alerts.

Curious how it works? Let’s take a look at a Leo Web Alert designed to track critical vulnerabilities and zero-days related to Cisco Systems:

Leo Web Alerts: A powerful and intuitive search and tracking interface

Creating a Leo Web Alert is a three-step process:

Use Leo Concepts to define the intelligence you want to gather. In our example, we use the ‘High Vulnerability’ and ‘Cisco Systems’ Leo Concepts to discover new critical vulnerabilities related to Cisco Systems.Use AND, OR, NOT operators to combine multiple Leo Concepts and refine your focus. In our example, we use AND to track articles and reports that reference both ‘High Vulnerabilities’ and ‘Cisco Systems’.If needed, refine sources with your own trusted sources. By default, Leo Web Alerts will search across the Cybersecurity Bundle (a collection of 50,000+ security news sources, threat research blogs, newsletters, vendor advisories, government agencies, vulnerability databases, CISO magazines, and Reddit communities curated collectively by 200,000 cyber professionals using Feedly and partitioned by Leo into three tiers based on popularity and authority).

Leo Web Alerts are feeds you can add to a team or personal folder. New articles, reports, or social media posts matching the specified Leo Concepts will appear in the Leo Web Alert feed.

Leo Concepts are easier to use, more comprehensive and less noisy than traditional keyword searches

The power of Leo Web Alerts is that ‘High Vulnerability’ and ‘Cisco Systems’ are not simple keyword matches. These Leo Concepts are machine learning models that encapsulate a broader understanding of each concept:

‘High Vulnerability’ is a Leo Concept that tracks vulnerabilities with a CVSS score above 8 or a CVSS score above 5 that includes a known exploit. If the vulnerability does not have a CVSS score yet, a machine learning model is used to forecast the CVSS score based on the descriptions of the vulnerability. Learn more‘Cisco Systems’ is a ‘Company’ Leo Concept that tracks for mentions of Cisco by its name or any known aliases. When the company name is ambiguous, a disambiguation model is used to remove false positives.

Without Leo Concepts, gathering intelligence would require a tedious effort of trying to find a long list of the right keywords, leaving room for blind spots and lots of irrelevant results.

Feedly for Threat Intelligence comes with a wide range of pre-trained Leo Concepts so that you can easily translate your intelligence needs into Leo Web Alerts.

Feedly includes models for key threat intelligence concepts.

Let’s see how we can combine these Leo Concepts to proactively track specific threats and stay one step ahead of your adversaries.

Research the behavior of specific threat actors and malware families

Tracking the behavior of threat actors and malware families can be tedious and overwhelming, taking up valuable time that could be spent hunting for malicious activity in your environment.

That’s why Feedly has created a set of Leo Concepts that automatically tag threat actors, malware families, TTPs, and IoCs.

Let’s take a look at a Leo Web Alert designed to track the latest IoCs and TTPs related to Lazarus Group across threat intelligence reports published on the web:

Gather IoCs and TTPs related to Lazarus Groups from intelligence reports

‘Lazarus Group’ is a ‘Threat Actor’ Leo Concept powered by Malpedia that tracks mentions of the threat actor by name or its many aliases. Learn more‘Indicators of Compromise’ is a Leo Concept that tracks malicious URLs, IPs, email addresses, domains, and hashes. Learn more‘Tactics & Techniques’ is a Leo Concept powered by the Mitre ATT&CK v10 framework that tracks tactics, techniques, and sub-techniques and their relationships. Learn more‘Threat Intelligence Report’ is a Leo Concept that flags intel reports containing in-depth technical details about IoCs, TTPs, threat actors, and malware. Learn more

Here are some additional Leo Concepts you can use to broaden or narrow your threat profiling:

Understand the threat landscape around your industry

Staying up to date with the latest attacks against your industry can help you be better prepared when putting defenses in place, as well as help you learn about which threat actors to look out for so you can be more targeted when gathering intelligence.

Let’s take a look at a Leo Web Alert designed to gather intelligence about cyber attacks in the finance industry:

Track cyber attacks around the finance industry

‘Cyber Attacks’ is a Leo Concept that tracks instances of cyber attacks and tries to determine who or what the target of the attack is. Learn more‘Finance Industry’ is an ‘Industry’ Leo Concept that classifies articles related to the finance industry based on company mentions and terminology. Learn more

You can also easily narrow your focus on a specific type of attack:

Track credit card data breaches

Monitor critical vulnerabilities and zero-days

Manually keeping ahead of new vulnerabilities and zero-days is an impossible task, but you can set up Leo Web Alerts to help you stay up to date on new vulnerabilities that come across the radar of the global cybersecurity community.

Feedly aggregates vulnerability information from NVD and over 20 vendor advisory sites — as well as monitoring many sources to find exploits for each CVE — in near real-time.

Let’s take a look at a Leo Web Alert designed to surface critical vulnerabilities and zero-days related to a vendor deployed in your environment:

Track high vulnerabilities related to Zoom

When you discover a new CVE, you can use the CVE intelligence card to get a 360 degree view of that vulnerability and decide if you should create a ticket for your response team.

A CVE intelligence card – a 360 degree view of CVE-2021-44228

Track niche cybersecurity topics

You can also use Leo Web Alerts to track niche cybersecurity topics.

Let’s take a look at a Leo Web Alert designed to gather intelligence about malicious, compromised, or hijacked packages:

Here are some additional Leo Concepts you can use to track niche cybersecurity topics:

Getting smarter every day

The world’s leading cybersecurity teams use Feedly for their OSINT, so the product constantly improves based on their feedback.

Here is a roadmap of some of the new Leo Concepts we are researching:

2022 Leo Concepts Roadmap – Threat Intelligence

Feedly for Threat Intelligence customers can reach out to us at enterprise@feedly.com to give feedback on improving existing Leo Concepts or creating new ones to ensure that Feedly is working at full capacity to serve your Threat Intelligence needs.

Try Feedly for Threat Intelligence

All of these features, plus many more, are available as a part of Feedly for Threat Intelligence. To learn more about any of these features, or start a free 30-day trial, click the link below.


Source link

Related posts

Oliver Pilkinton Commits to Harvard, Setting Up Family Rivalry with Sisters at Yale


ASU Commit Ilya Kharun of Sandpipers Crushes Junior National 7.5k


ALL THE LINKS (& Selection Procedures) To Follow the 2022 Canadian Swim Trials


Leave a Comment