Skip to content

Threat Feed

The Threat Feed provides a curated stream of threat intelligence covering ransomware groups, threat actors, vulnerabilities, exploits, and data breaches -- all summarized by AI for rapid consumption.

Overview

Threat Feed

The feed displays intelligence items as a card grid. Each card contains a title, AI-generated summary, metadata chips, and source attribution. Cards are loaded progressively as you scroll, with the total count shown in the page header.

Card Data

Each threat feed card displays:

FieldDescription
TitleHeadline of the threat intelligence item
SummaryAI-generated content summary for quick scanning
CategoryClassification tag (e.g., Ransomware, Vulnerability, Data Breach, Exploit)
Threat ActorThe attributed threat actor or group, when known
CountryCountry flag and name of the victim or target geography
IndustryTargeted industry sector
OrganizationNamed victim organization, when publicly disclosed
SiteSource website where the intelligence was collected
Source LinkDirect URL to the original intelligence source
ScreenshotsAttached evidence images, viewable in an inline image viewer
DateWhen the item was discovered, shown as relative time with full timestamp on hover

Filtering

The filter bar across the top supports multi-select filtering on several dimensions:

FilterDescription
SearchFree-text search across titles and content
CategoryFilter by intelligence type (Ransomware, APT, Exploit, etc.)
CountryFilter by victim or target country
IndustryFilter by targeted sector (Financial Services, Healthcare, Energy, etc.)
Threat ActorFilter by attributed threat actor name
SiteFilter by source website
OrganizationFilter by named victim organization

All filters use AND logic when combined. Filters are dynamically populated from the backend based on available data.

Admin Preferences

Administrators can configure default feed preferences by clicking the Preferences button in the header (visible only to admin users). This navigates to Settings > News Alert Settings where you can set default category, country, and sector filters that apply automatically when a user first loads the page.

  1. Scan the card grid for items relevant to your industry, geography, or technology stack
  2. Use filters to narrow results when investigating specific threat actors or regions
  3. Click source links to read the full original report
  4. Review screenshots for visual evidence of dark web posts, defacement, or leak announcements
  5. Share relevant items with your team for threat briefings or incident preparation

ShadowMap by Security Brigade