15-second summary
Researching a cyberattack usually means jumping between news sites, vendor blogs, and threat intel feeds to find out what happened, who is behind it, and whether you’re at risk.
Cyberattack Insights cards consolidate available information about an attack into a dynamic view that updates as new information emerges. you can:
- Get the entire attack context in one place, including threat actors, malware, IoC, TTPs, CVEs, and a timeline of events, all aggregated from 10,000+ sources and continually enriched as the situation evolves.
This blog demonstrates how the feature works and how it can speed up your attack research and reporting.
overview
When a major cyberattack hits the news, the race begins to understand what happened. Who was targeted? Which threat actor is responsible? What malware was used? Are there IOCs that your team should be looking for?
For most CTI analysts, answering these questions means opening dozens of browser tabs and jumping between news articles, vendor blogs, threat intel feeds, leak sites, and social media. You’re manually piecing together pieces of information while trying to build a coherent picture, all while the situation continues to evolve.
Cyber Attack Insights Cards provide a 360° view of a specific cyber attack with all the context needed to quickly assess the potential threat.
How Cyberattack Insights Cards Work
Behind each Cyberattack Insights card is Feedly’s Threat Graph, which continuously processes and analyzes content from over 10,000 trusted cyber sources. Using machine learning models, Feedly AI extracts and correlates key entities from this content: victims, affected industries, threat actors, malware families, exploited CVEs, IOCs, and TTPs. As Feedly continues to monitor sources, all entities associated with the attack are continuously updated.
What’s inside the Cyberattack Insights Card?
When you open the Cyberattack Insights card, you get a structured view of everything collected by Feedly’s Threat Graph about an attack.
- Top-level information for immediate reference: when the attack was first reported, last updated, number of articles, and key features such as attack type, threat actors, malware, and affected industries.
- The attack summary provides a dynamic, AI-generated overview synthesized from multiple sources with inline citations. It updates automatically as new information emerges.
- Victim information along with details of the targeted organization.
- Exportable IOCs in STIX 2.1, MISP, or CSV formats for integration with your security devices.
- The timeline of events shows how the attack occurred chronologically.
- For deeper investigation, relevant threat actors, malware, TTPs and CVEs have been added with clickable links on their respective insight cards.
- Article count graph showing coverage trends over time.
- Articles with links to original sources when you need to verify details or go deeper.
Ask specific questions about cyberattacks with Ask AI
One of the most powerful features in the Cyberattack Insights Card is Ask AI. It analyzes all the content from the Insights card and creates tailored responses in seconds, whether you need a technical breakdown for your team, an executive summary for leadership, or answers to specific questions about an attack. What separates Ask AI from typical AI tools is the context behind every answer: Feedly automatically grounds your prompt in relevant, curated intelligence, so responses are more accurate, more specific, and ready to copy directly into a report, email, or document without the need for manual synthesis.
In short…
Cyber Attack Insights cards change the way you research and respond to attacks. Instead of manually hunting through scattered sources and struggling to keep up with emerging events, you get a single, comprehensive view that automatically updates as Feedly learns more about the threat graph.
Whether you’re conducting in-depth analysis, answering stakeholder questions, preparing for briefings, or monitoring ongoing incidents, Cyberattack Insights Cards provide the complete context you need without the manual research burden.
Go from discovery to actionable intelligence in minutes
Explore the details of a cyberattack, track timelines, and uncover threat actor connections with Feedly’s Cyberattack Insights Card.
start free Trial
