{"id":"https:\/\/feedly.com\/new-features","title":"New in Feedly","updated":"2026-04-16T19:28:39.738Z","link":[{"@attributes":{"rel":"alternate","href":"https:\/\/feedly.com\/new-features"}},{"@attributes":{"rel":"self","href":"https:\/\/feedly.com\/new-features\/feed.xml"}}],"entry":[{"title":{"@attributes":{"type":"html"}},"id":"0117495e-12c2-4ab1-8683-a6b30ff0c12b","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/navigate-feedly-faster-with-go-to"}},"updated":"2026-04-07T23:17:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Gaby Zedan"},"category":{"@attributes":{"term":"Fundamentals"}}},{"title":{"@attributes":{"type":"html"}},"id":"8c490507-07c5-42a6-85bb-b6f134f31104","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/introducing-feedly-threatbeats-your-daily-intel-jingles"}},"updated":"2026-04-02T02:10:00.000Z","content":{"@attributes":{"type":"html"}},"author":[{"name":"Shawn Jaques"},{"name":"Gaby Zedan"}],"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"db23bf4b-3fe3-4750-8296-95b5318ffb02","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/practical-ways-to-use-the-feedly-api-to-operationalize-threat-intelligence"}},"updated":"2026-03-31T23:09:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Aaron O'Maley"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"1c4562ef-13ab-423b-a0cb-c47fc893cff2","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/get-threat-intelligence-to-your-team-fast-in-the-tools-they-already-use"}},"updated":"2026-03-17T22:25:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Shawn Jaques"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"176f6b93-d7f8-4755-b505-d50d8b294a8b","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/tracking-the-cyber-consequences-of-geopolitical-events"}},"updated":"2026-03-11T22:06:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Alessandro Magi"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"8590b3a8-c802-4cf0-b8a6-fa86a0f30b23","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/analyze-your-closed-source-intelligence-in-feedly"}},"updated":"2026-03-10T16:48:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Gaby Zedan"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"0e0c2b18-0a78-4eec-9aa2-c1a00ed73928","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/cyberattack-insights-cards"}},"updated":"2026-02-18T01:41:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Gaby Zedan"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"b081bfd9-4c51-4b82-9d40-44712c8c2e76","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/vulnerability-agent-7-ways-to-use-cvss-vector-filters-for-smarter-cve-prioritization"}},"updated":"2026-02-03T17:48:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Andrew Castro"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"1dbad875-7538-4e10-a198-f516a205ce50","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/ask-ai-on-threat-actor-insights-cards-accelerate-adversary-research-with-custom-queries"}},"updated":"2026-01-27T17:47:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Shawn Jaques"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"9099512f-5006-479c-8e03-77b0fd90eb07","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/research-iocs-with-rich-context-in-seconds-not-hours"}},"updated":"2026-01-21T19:14:00.000Z","content":{"@attributes":{"type":"html"}},"author":[{"name":"Shawn Jaques"},{"name":" Olivia Malterre"}],"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"7a1e5455-6e40-43f4-ab1f-567d7b7ecd8a","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/surface-top-threats-in-cti-newsletters"}},"updated":"2026-01-20T18:56:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Shawn Jaques"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"69ddb9e8-5133-415d-b500-9da8ad7593f5","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/the-scanner-exploring-potential-futures"}},"updated":"2025-12-05T00:29:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Tino Klaehne"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"c9b49b67-ad86-42fa-8b96-4c2451413f55","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/the-radar-detecting-emerging-signals"}},"updated":"2025-11-21T16:13:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Tino Klaehne"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"21f4aa89-e622-47c0-a7f2-7a76e4cc9a05","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/prompt-engineering-newsletter-template-for-real-time-phishing-trends"}},"updated":"2025-11-19T20:48:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Andrew Castro"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"344af14a-4927-4a7a-8b7e-ec60d9a616f2","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/the-monitor-tracking-the-known-present"}},"updated":"2025-11-14T16:40:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Tino Klaehne"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"f0bf2dc0-62f2-423b-8890-1a727a05d6ed","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/startup-innovation-radar-a-real-time-startup-database"}},"updated":"2025-11-06T17:07:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"f5b47bac-3381-49a1-94fb-6b8f810df050","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/the-insightos-architecture"}},"updated":"2025-11-05T13:01:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Tino Klaehne"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"c3967c6c-48e0-41c4-a076-21e445216eec","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/feedly-mcp-server-automate-cti-workflows-with-claude-and-the-feedly-threat-graph"}},"updated":"2025-11-04T16:31:00.000Z","content":{"@attributes":{"type":"html"}},"author":[{"name":"Shawn Jaques"},{"name":"Dave Johnson"}],"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"fa6aecc5-a26b-45c8-8e3e-944adaea4491","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/strategic-intelligence-at-the-speed-of-change"}},"updated":"2025-10-27T17:38:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Tino Klaehne"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"b185e7c5-6385-47ff-b028-5892ae10e477","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/cyberattack-dashboard-examples"}},"updated":"2025-10-23T19:18:00.000Z","summary":{"@attributes":{"type":"html"}},"content":{"@attributes":{"type":"html"}},"author":{"name":"Shawn Jaques"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"218901f8-3499-4aa4-8566-50e97d9c7f40","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/action-critical-threats-instantly-send-new-intel-directly-to-slack"}},"updated":"2025-10-16T18:51:00.000Z","summary":{"@attributes":{"type":"html"}},"content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"e594df2f-a290-4b3e-bada-0c613a7931a9","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/prompt-engineering-generate-red-team-emulation-plans"}},"updated":"2025-10-07T22:13:00.000Z","summary":{"@attributes":{"type":"html"}},"content":{"@attributes":{"type":"html"}},"author":{"name":"Andrew Castro"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"f80d19b0-df57-417b-a1d9-09c24427bb99","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/cyberattack-dashboard-discover-and-monitor-relevant-cyber-attacks"}},"updated":"2025-09-25T16:54:00.000Z","summary":{"@attributes":{"type":"html"}},"content":{"@attributes":{"type":"html"}},"author":{"name":"Shawn Jaques"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"8c14214d-13cf-4b9e-8465-63ce2e63548a","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/uncover-emerging-trends-within-your-industry"}},"updated":"2025-08-12T16:54:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"f9af73f7-6d26-43ff-b5e9-f59d0d84e275","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/effortless-onboarding-for-new-team-members-in-feedly"}},"updated":"2025-08-07T17:42:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Ana Moya"},"category":{"@attributes":{"term":"Fundamentals"}}},{"title":{"@attributes":{"type":"html"}},"id":"cb7faa42-2bcc-48e9-9c69-0b0b53bf1777","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/feedly-s-cvss-estimate-score"}},"updated":"2025-07-24T16:24:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Alessandro Magi"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"fbf6364c-de01-4fda-8843-f16e972337a1","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/multilingual_ai_market_intelligence"}},"updated":"2025-07-16T15:26:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"f0231d05-0c1d-4fab-9af2-8e9dbcb0bf30","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/new-innovation-ai-models"}},"updated":"2025-06-18T20:53:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"55b3fccc-bbe4-4dda-babb-7ff0cd1aa62d","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/cve-insights-cards-2025"}},"updated":"2025-06-16T19:02:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Gaby Zedan"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"367a645d-90b0-4a6f-9723-be5b647c5717","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/turn-press-releases-into-competitive-signals"}},"updated":"2025-06-10T16:59:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"75a9c4fb-cb7f-4378-8d74-25d4006df993","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/accelerate-your-research-with-prompt-suggestions-in-ask-ai"}},"updated":"2025-06-04T17:20:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Gaby Zedan"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"67d18ab7-1bf4-4f4d-9714-e7bee328d1e0","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/conducting-historical-search-with-feedly"}},"updated":"2025-05-28T18:28:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"75188b24-e558-43e8-ad05-d8c663e48161","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/how-to-optimize-your-emerging-trends-dashboard-to-surface-relevant-trends"}},"updated":"2025-05-20T18:17:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"1fe9b7ee-d996-479c-898a-09bb5b69e70a","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/feedly-threat-intelligence-threatconnect-enhance-context-in-your-tip"}},"updated":"2025-05-15T17:02:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Shawn Jaques"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"fd7d178c-2d49-4b45-8676-66abeec8ee1f","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/linkedin-feeds-mi"}},"updated":"2025-05-14T17:09:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"a84732d8-b991-4a72-bfb0-b0651405b990","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/unlock-industry-insights-to-drive-smarter-decisions"}},"updated":"2025-05-06T17:45:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"85df8106-3f76-4ec6-8725-a344d358a9a1","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/prompt-engineering-explore-cve-chaining-potential"}},"updated":"2025-05-02T01:11:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Gaby Zedan"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"7ae86569-27f7-4000-baf9-45733f210ff0","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/ask-ai-in-cve-insights-cards"}},"updated":"2025-04-24T19:25:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Shawn Jaques"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"0dba93a5-6b31-4791-a22d-36797853cc2a","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/prompt-engineering-build-a-report-on-ai-agents-in-seconds"}},"updated":"2025-04-22T22:51:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"f3521992-7760-4c85-99bb-29564a12cb32","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/prompt-engineering-generate-vulnerability-advisories-at-scale"}},"updated":"2025-04-17T22:38:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Andrew Castro"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"f3ae631e-3750-4a51-b97f-9f7f3e9f9498","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/further-fine-tune-your-ai-feeds-with-natural-language-filters"}},"updated":"2025-04-10T18:32:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Shawn Jaques"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"fde50c95-6483-4b1a-acff-21463483b372","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/fine-tune-your-feedly-ai-feeds-with-natural-language-filters"}},"updated":"2025-04-09T15:58:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"060b4a99-4fd5-4d2b-9caa-6bd83437f665","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/pdfs-in-feedly-turn-static-pdfs-into-actionable-threat-intelligence"}},"updated":"2025-04-03T15:40:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Shawn Jaques"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"fd63cdff-d91c-4e8b-87f9-09f716f1b23c","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/pdfs-in-feedly-read-and-extract-market-intelligence-faster"}},"updated":"2025-04-01T17:07:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"f5e5d41a-1037-47e5-8aa9-7883a5d00bc2","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/multilingual-ai-global-threat-intel-without-language-barriers"}},"updated":"2025-03-27T19:07:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Shawn Jaques"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"a3d01e6b-49e8-4681-b408-e179a356585c","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/prompt-engineering-generate-a-tariff-analysis-report-in-seconds"}},"updated":"2025-03-18T17:31:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"5ebbdb55-aa62-4ac2-9c81-5c3a33ea2b3f","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/prompt-engineering-conduct-a-diamond-model-of-intrusion-analysis"}},"updated":"2025-03-13T16:26:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Andrew Castro"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"054f2813-09e6-41c0-ad2e-ec875e1cbf4a","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/new-feedly-ask-ai-from-information-overload-to-actionable-insights"}},"updated":"2025-03-12T16:08:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Jay Feyerabend"},"category":{"@attributes":{"term":"Market Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"42198588-1d1d-4858-b4f2-fa4dc98d8836","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/new-feedly-ask-ai-synthesize-threat-reports-and-articles-in-minutes-with-high-accuracy"}},"updated":"2025-03-04T16:23:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Shawn Jaques"},"category":{"@attributes":{"term":"Threat Intelligence"}}},{"title":{"@attributes":{"type":"html"}},"id":"9554759e-92f0-47a3-8db4-bf4ba4e6f119","link":{"@attributes":{"href":"https:\/\/feedly.com\/new-features\/posts\/ai-in-threat-intelligence-newsletters-faster-creation-bigger-impact"}},"updated":"2025-02-25T14:51:00.000Z","content":{"@attributes":{"type":"html"}},"author":{"name":"Shawn Jaques"},"category":{"@attributes":{"term":"Threat Intelligence"}}}]}