# Fontes de Inteligencia Base de fontes abertas (OSINT) monitoradas continuamente pelo RunkIntel. Toda inteligencia publicada e derivada exclusivamente de fontes publicas, coletadas e curadas por pipeline automatizado. > [!abstract]- Como Usar Este Registro > Este registro documenta todas as **100+ fontes OSINT** monitoradas pelo RunkIntel, organizadas em 4 tiers por confiabilidade e frequência de coleta: > - **Tier 1** (RSS/Blogs): Pesquisa original de vendors - coleta diária > - **Tier 2** (APIs): NVD, CISA KEV, MSRC - coleta a cada 4 horas > - **Tier 3** (Social): Reddit, Twitter/X - triagem diária > - **Tier 4** (Feeds): IOCs, pulses, threat data - coleta a cada 6 horas > > Escala de confiabilidade: **A** (fonte primária) → **B** (secundária confiável) → **C** (verificar claims) → **D/F** (requer corroboração) ```mermaid mindmap root((100+ Fontes OSINT)) Vulnerabilidades 17 NVD CISA KEV VulnCheck ZDI Threat Intel 29 Mandiant CrowdStrike Unit 42 Securelist LATAM e Brasil 18 CERT.br Tempest Apura Redbelt Supply Chain 7 Snyk Socket.dev Sonatype IOC Feeds 6 Shadowserver GreyNoise ThreatFox AI Threats 5 IBM X-Force HiddenLayer ICS e OT 6 Dragos Claroty Dark Web 3 Ransomware.live Crypto 4 Chainalysis SlowMist Industria 15 Krebs SANS ISC CERTs Globais 5 NCSC UK ANSSI ``` ```mermaid pie title Distribuição das 100+ Fontes por Categoria "Threat Intel" : 29 "LATAM e Brasil" : 18 "Vulnerabilidades" : 17 "Industria" : 15 "Supply Chain" : 7 "IOC Feeds" : 6 "ICS/OT" : 6 "AI Threats" : 5 "CERTs Globais" : 5 "Crypto/DeFi" : 4 "Dark Web" : 3 ``` > [!abstract] 100+ fontes únicas - 13 categorias - Tiers 1-4 - Confiabilidade A-C > Coleta automatizada via RSS, JSON APIs, Twitter API v2 e GitHub Atom. > Pipeline: **collect** (cada 2h) → **curaté** (scoring 0-100) → **enrich** → **publish** --- ## Escala de Confiabilidade | Nivel | Significado | Uso no scoring | |-------|-------------|----------------| | **A** | Altamente confiavel - fonte primaria, pesquisa original | +30 pontos | | **B** | Confiavel - fonte secundaria respeitavel, bom historico | +20 pontos | | **C** | Geralmente confiavel - agregador, verificar afirmacoes-chave | +10 pontos | --- ## Vulnerabilidades & Exploits > [!warning] Prioridade maxima - CVEs ativamente explorados, advisories e PoCs > Fontes primarias para priorizacao de patches. Qualquer CVE no catalogo CISA KEV exige nota no vault em 24 horas. | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | BleepingComputer | https://www.bleepingcomputer.com/ | 1 | A | ransomware, breaches, exploits | | NVD - NIST | https://nvd.nist.gov/ | 2 | A | cve, cvss, patches | | CISA | https://www.cisa.gov/ | 2 | A | cve, kev, advisories | | CISA Cybersecurity Advisories | https://www.cisa.gov | 2 | A | advisories, ics-cert, vulnerability-alerts | | Cisco Security | https://sec.cloudapps.cisco.com/ | 2 | A | cve, advisories, network-security | | GitHub Advisory Database | https://github.com/advisories | 2 | A | cve, supply-chain, dependencias | | Google Project Zero | https://googleprojectzero.blogspot.com | 2 | A | zero-day, vulnerability-research | | Microsoft MSRC | https://msrc.microsoft.com/ | 2 | A | cve, patch-tuesday, windows | | Rapid7 | https://www.rapid7.com | 2 | A | vulnerabilities, exploitation, detection | | Tenable | https://www.tenable.com | 2 | A | vulnerabilities, exposure-management | | VulnCheck | https://vulncheck.com/blog | 1 | A | exploitability-scores, kev-faster | | Zero Day Initiative | https://www.zerodayinitiative.com | 2 | A | zero-day, vulnerability-disclosure | | Exploit Database | https://www.exploit-db.com | 2 | B | exploits, proof-of-concept | | CERT-EU | https://cert.europa.eu | 2 | A | advisories, eu-threats | | AttackerKB | https://attackerkb.com | 2 | B | community-severity, exploitability | | FIRST EPSS | https://www.first.org/epss | 2 | A | exploit-probability, scoring | | r/netsec | https://www.reddit.com/r/netsec | 3 | C | security-research, exploits | > [!info] 17 fontes - Tiers 1-3 - Confiabilidade A-C --- ### CISA KEV > [!important] Fonte prioritaria - Vulnerabilidades com exploração ativa confirmada > O CISA Known Exploited Vulnerabilities (KEV) Catalog lista vulnerabilidades com exploração ativa confirmada. Criado em novembro de 2021 sob a BOD 22-01, e a referencia autoritativa global para priorizacao baseada em ameaças reais. **Endpoint:** `https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json` **Autenticação:** Nenhuma - **Formato:** JSON - **Verificação:** Horaria | Metrica | Valor | |---------|-------| | Total de CVEs (dez/2025) | ~1.484 | | Adicionadas em 2025 | 245 | | CVEs com ransomware (2025) | 24+ | **Combinacao ideal:** KEV (exploração confirmada) + CVSS (severidade) + EPSS (probabilidade) = visao completa de risco. --- ## Threat Intelligence Global > [!danger] APTs, campanhas, espionagem e inteligencia estratégica > Pesquisa original de grupos de ameaça, análise de campanhas e atribuicao. Fontes com maior valor analitico para perfis de threat actors e detecção de TTPs. | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | Bitdefender Labs | https://www.bitdefender.com/blog/labs | 1 | A | malware, apt, ransomware | | Checkpoint Research | https://research.checkpoint.com/ | 1 | A | malware, mobile, apt | | CrowdStrike | https://www.crowdstrike.com | 1 | A | apt, malware, threat-intelligence | | Elastic Security Labs | https://www.elastic.co/security-labs | 1 | A | malware-analysis, detection-rules | | Fortinet Threat Research | https://www.fortinet.com | 1 | A | malware, vulnerabilities | | Google Threat Analysis Group | https://blog.google/threat-analysis-group | 1 | A | apt, nation-state, zero-day | | Huntress | https://www.huntress.com | 1 | A | smb-threats, ransomware | | Intel471 | https://intel471.com | 1 | A | cybercrime, underground | | Kela | https://www.kelacyber.com | 1 | A | cybercrime, dark-web | | Mandiant Blog (Google) | https://www.mandiant.com/resources/blog | 1 | A | apt, espionagem, incident-response | | Microsoft Security Blog | https://www.microsoft.com/security/blog | 1 | A | apt, ransomware | | Proofpoint | https://www.proofpoint.com | 1 | A | phishing, email-threats, apt | | Recorded Future Blog | https://www.recordedfuture.com/blog | 1 | A | threat-intelligence, geopolitica | | Red Canary | https://www.redcanary.com | 1 | A | detection-engineering, threat-detection | | Securelist (Kaspersky) | https://securelist.com/ | 1 | A | apt, malware, latam | | SentinelOne Labs | https://www.sentinelone.com/labs | 1 | A | apt, reverse-engineering | | Talos Intelligence (Cisco) | https://blog.talosintelligence.com/ | 1 | A | threat-research, vulnerabilities | | Trend Micro | https://www.trendmicro.com | 1 | A | malware, ransomware, apt | | Unit 42 (Palo Alto) | https://unit42.paloaltonetworks.com/ | 1 | A | apt, malware-analysis | | VirusTotal Blog | https://blog.virustotal.com | 2 | A | malware-analysis, tools | | Volexity | https://www.volexity.com/blog/ | 1 | A | apt, memory-forensics | | WithSecure Labs | https://labs.withsecure.com/ | 1 | A | apt, malware-analysis | | Wiz Research | https://www.wiz.io/blog/tag/research | 1 | A | cloud-security, misconfigurations | | Zscaler ThreatLabz | https://www.zscaler.com/blogs/security-research | 1 | A | cloud-threats, ransomware | | DoublePulsar (Kevin Beaumont) | https://doublepulsar.com | 1 | A | critical-vulns, ransomware-analysis | | Flare | https://flare.io | 1 | B | dark-web, exposure-management | | MISP Project | https://www.misp-project.org | 2 | A | threat-sharing, iocs, standards | | OTX AlienVault | https://otx.alienvault.com/ | 4 | B | iocs, threat-pulses | | SOCRadar | https://socradar.io | 1 | B | dark-web, vulnerability-intelligence | > [!info] 29 fontes - Tiers 1-4 - Confiabilidade A-B --- ## Supply Chain Security > [!danger] Ataques a cadeias de suprimento de software - npm, PyPI, containers > Comprometimento de pacotes open-source cresceu 38% em 2025-2026. Categoria completamente nova - nenhuma plataforma CTI em portugues cobre isso sistematicamente. | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | Snyk Blog | https://snyk.io/blog | 1 | A | npm, PyPI, dependency-vulns | | Socket.dev Blog | https://socket.dev/blog | 1 | A | malicious-packages, real-time | | Sonatype Blog | https://blog.sonatype.com | 1 | A | oss-supply-chain, repository-attacks | | Checkmarx Security | https://checkmarx.com/blog | 1 | A | sast-sca, supply-chain-compromise | | ReversingLabs Blog | https://www.reversinglabs.com/blog | 1 | A | binary-analysis, software-threats | | Chainguard Blog | https://www.chainguard.dev/unchained | 1 | B | container-security, sbom | | Phylum Blog | https://blog.phylum.io | 1 | B | npm-pypi, malicious-packages | > [!info] 7 fontes - Tier 1 - Confiabilidade A-B --- ## IOC Feeds Operacionais > [!warning] Indicadores de compromisso estruturados - IPs, hashes, URLs, dominos > Feeds machine-readable que alimentam detecção automatizada. Coletados via JSON API dedicado (collect-iocs.py), separado do pipeline narrativo. | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | Shadowserver Foundation | https://www.shadowserver.org | 1 | A | honeypots, sinkholes, scanning-global | | Censys Blog | https://censys.com/blog | 1 | A | internet-scanning, exposure-data | | GreyNoise Blog | https://www.greynoise.io/blog | 2 | A | internet-noise, mass-exploitation | | Spamhaus | https://www.spamhaus.org | 2 | A | ip-blocklists, botnet-tracking | | ThreatFox (abuse.ch) | https://threatfox.abuse.ch | 4 | B | malware-iocs, c2-infrastructure | | Pulsedive Blog | https://blog.pulsedive.com | 2 | B | ioc-enrichment, community-feeds | > [!tip] IOC Layer > IOCs sao coletados em camada separada do conteudo narrativo. Dados JSON normalizados sao armazenados em `_private/iocs/` e correlacionados com notas do vault automaticamente. > [!info] 6 fontes - Tiers 1-4 - Confiabilidade A-B --- ## AI & Ameaças Emergentes > [!danger] Ameaças a plataformas de IA, LLMs, adversarial ML e model attacks > Phishing gerado por IA já representa ~60% dos vetores de acesso inicial. Mais de 300.000 credenciais de ChatGPT foram expostas em 2025. Categoria emergente e critica. | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | IBM Security Intelligence | https://securityintelligence.com | 1 | A | x-force, ai-threats, global-cti | | HiddenLayer Research | https://hiddenlayer.com/research | 1 | A | ai-model-attacks, mlsec | | Trail of Bits Blog | https://blog.trailofbits.com | 1 | A | security-research, ai-crypto-audit | | OWASP Blog | https://owasp.org | 2 | A | llm-top-10, web-security | | Protect AI Blog | https://protectai.com/blog | 1 | B | ai-platform-security, ml-pipeline | > [!info] 5 fontes - Tiers 1-2 - Confiabilidade A-B --- ## Dark Web & Underground > [!warning] Monitoramento de forums, Telegram, leak sites e mercados clandestinos > Inteligencia sobre atividade de grupos de ransomware, vazamentos de dados e negociacao de acessos em mercados underground. | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | Searchlight Cyber | https://www.searchlightcyber.com/blog | 1 | B | dark-web-intelligence, underground | | Ransomware.live | https://www.ransomware.live | 2 | B | ransomware-gangs, leak-sites, vitimas | | deepdarkCTI (GitHub) | https://github.com/fastfire/deepdarkCTI | 3 | B | telegram, dark-web, leak-sites | > [!info] 3 fontes - Tiers 1-3 - Confiabilidade B --- ## Crypto & DeFi Threats > [!warning] Exploits em blockchain, DeFi hacks, crime on-chain e wallet malware > Rastreamento de incidentes cripto, análise on-chain de pagamentos de ransomware e ataques a protocolos DeFi. | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | Chainalysis Blog | https://www.chainalysis.com/blog | 1 | A | crime-on-chain, ransomware-payments | | SlowMist Blog | https://slowmist.medium.com | 1 | A | defi-hacks, wallet-malware | | Rekt News | https://rekt.news | 2 | B | defi-exploit-post-mortems | | BlockThreat Newsletter | https://blockthreat.substack.com | 2 | B | crypto-threat-intel | > [!info] 4 fontes - Tiers 1-2 - Confiabilidade A-B --- ## LATAM & Brasil > [!danger] Foco regional - ameaças com impacto direto no Brasil e America Latina > Fontes primarias para CTI com recorte LATAM. Essenciais para cobertura de banking trojans, phishing nacional, ransomware em PT-BR e politica cibernetica brasileira. O Brasil concentrou 84% das atividades maliciosas detectadas na America Latina no primeiro semestre de 2025. ### Governo & CERTs Brasileiros | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | CERT.br | https://www.cert.br/ | 1 | A | incidentes-brasil, phishing, botnets | | CTIR Gov | https://www.gov.br/ctir/pt-br | 1 | A | incidentes-governo-federal, alertas-criticos | | CAIS/RNP | https://cais.rnp.br | 1 | A | rede-academica-brasil, segurança | | ANPD | https://www.gov.br/anpd | 2 | A | lgpd, compliance-brasil, vazamentos | | Anatel | https://www.anatel.gov.br/ | 2 | B | Telecom, regulatorio-brasil | ### Empresas Brasileiras de CTI | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | Tempest Security (SideChannel) | https://www.sidechannel.blog | 1 | A | banking-trojans, cibercrime-brasil | | Apura Cyber Intelligence | https://apura.com.br | 1 | A | dark-web-brasil, fraudes, risco-digital | | Redbelt Security Blog | https://www.redbelt.com.br/blog | 1 | A | pesquisa-original-brasil, ransomware-br | | ISH Tecnologia | https://www.ish.com.br/blog | 1 | B | ransomware-brasil, threat-intelligence | | Axur | https://blog.axur.com | 1 | B | risco-digital, fraude-marca, darkweb-brasil | | Security Leaders BR | https://securityleaders.com.br | 2 | B | news-cibersegurança-brasil | | FEBRABAN Portal | https://portal.febraban.org.br | 2 | A | fraude-financeira-br, banking-trojans | ### Cobertura LATAM Regional | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | Kaspersky LATAM Blog | https://latam.kaspersky.com/blog/ | 1 | A | latam, malware-bancario, fraude | | Kaspersky ICS CERT | https://ics-cert.kaspersky.com | 1 | A | ics-ot-latam, infraestrutura-critica | | ESET LATAM (WeLiveSecurity) | https://www.welivesecurity.com/la-es/ | 1 | A | latam-malware, apt, banking-trojans | | SCILabs (Telmex - Mexico) | https://scilabs.mx | 1 | B | mexico-cti, latam-threat-research | | LACNIC CSIRT | https://csirt.lacnic.net | 1 | A | latam-network-security, coordenacao | > [!info] 18 fontes - LATAM/Brasil - Confiabilidade A-B --- ## ICS/OT & Infraestrutura Critica > [!warning] Ameaças a sistemas industriais, OT/ICS, SCADA e infraestrutura critica > Fontes especializadas em operational technology. Altamente relevantes para setores de energia, agua, manufatura e Telecom no Brasil. | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | Dragos | https://www.dragos.com/blog | 1 | A | ics-ot, threat-groups, annual-report | | Nozomi Networks Labs | https://www.nozominetworks.com/labs | 1 | A | ot-iot, honeypot-telemetry | | Claroty (Team82) | https://claroty.com/blog | 1 | A | cps-security, ics-vulnerabilities | | ICS-CERT (CISA) | https://www.cisa.gov/topics/industrial-control-systems | 2 | A | scada, ics-advisories | | Kaspersky ICS CERT | https://ics-cert.kaspersky.com | 1 | A | ics-malware, industrial | | WaterISAC | https://www.waterisac.org | 1 | A | water-infrastructure, ot-threats | > [!info] 6 fontes - ICS/OT especializado - Confiabilidade A --- ## Government & CERTs Globais > [!abstract] Governos nacionais, CERTs soberanos e agencias reguladoras > Fontes oficiais de governos com mandato defensivo nacional. Alta confiabilidade, publicacao regular de advisories e threat landscape reports. | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | JPCERT/CC | https://www.jpcert.or.jp/english/ | 1 | A | jápan-cert, apac-threats | | NCSC UK | https://www.ncsc.gov.uk | 1 | A | uk-government, nation-state | | ANSSI (France) | https://www.cert.ssi.gouv.fr/ | 1 | A | france-cert, espionagem | | ENISA | https://www.enisa.europa.eu | 1 | A | eu-cybersecurity, regulation | | BSI (Germany) | https://www.bsi.bund.de/EN/ | 1 | A | germany-cert, infrastructure | > [!info] 5 fontes - Government/CERTs - Confiabilidade A --- ## Setor Financeiro & Saude > [!abstract] ISACs e fontes de inteligencia setorial > Information Sharing and Analysis Centers (ISACs) com foco em ameaças específicas por vertical. | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | FS-ISAC | https://www.fsisac.com/newsroom | 1 | A | financial-sector, banking-threats | | Health-ISAC | https://www.health-isac.org | 1 | A | healthcare-sector, ransomware-hospitais | | IC3 (FBI) | https://www.ic3.gov | 2 | A | fraud-statistics, cybercrime-trends | > [!info] 3 fontes - Setor especializado - Confiabilidade A --- ## Malware & Ferramentas > [!note] Amostras, IoCs, C2, sandbox e análise de malware > Feeds de IoCs estruturados, rastreamento de familias de malware e análise técnica de artefatos maliciosos. | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | Malware Traffic Analysis | https://www.malware-traffic-analysis.net | 1 | A | pcap-analysis, network-forensics | | Sophos X-Ops | https://sophos.com/en-us/blog | 1 | A | ransomware, incident-response | | The DFIR Report | https://thedfirreport.com | 1 | A | intrusion-analysis, ransomware | | ANY.RUN Blog | https://any.run/cybersecurity-blog | 1 | A | sandbox-intel, emerging-threats | | Objective-See Blog | https://objective-see.org/blog.html | 1 | A | macos-malware, iocs, annual-report | | Abuse.ch URLhaus | https://urlhaus.abuse.ch/ | 4 | B | urls-maliciosas, malware-distribution | | FeodoTracker | https://feodotracker.abuse.ch/ | 4 | B | botnet-c2, banking-trojans | | MalwareBazaar | https://bazaar.abuse.ch/ | 4 | B | malware-samples, hashes | | The Hacker News | https://thehackernews.com/ | 1 | B | noticias, vulnerabilidades | | TweetFeed | https://tweetfeed.live/ | 4 | B | iocs, hashes, urls-maliciosas | > [!info] 10 fontes - Tiers 1-4 - Confiabilidade A-B --- ## Industria & Pesquisa > [!abstract] Jornalismo, frameworks de detecção, pesquisadores independentes e comunidades > Noticias especializadas, frameworks (Sigma, YARA, Nuclei), newsletters curadas e comunidades de pesquisa de segurança. | Fonte | URL | Tier | Rel. | Foco | |-------|-----|------|------|------| | Atomic Red Team | https://github.com/redcanaryco/atomic-red-team | 2 | A | adversary-emulation, mitre-attack | | Bellingcat | https://www.bellingcat.com | 1 | A | osint, geopolitics | | F5 Labs | https://www.f5.com/labs | 1 | A | application-security, ddos | | Krebs on Security | https://krebsonsecurity.com/ | 1 | A | fraude, cibercrime, breaches | | LOLBAS Project | https://github.com/LOLBAS-Project/LOLBAS | 2 | A | living-off-the-land, evasion | | MITRE ATT&CK Blog | https://medium.com/mitre-attack | 1 | A | mitre-attack, framework | | Nuclei Templates | https://github.com/projectdiscovery/nuclei-templates | 2 | A | vulnerability-scanning | | SANS Internet Storm Center | https://isc.sans.edu/ | 1 | A | alertas, ataques-em-curso | | Schneier on Security | https://www.schneier.com | 1 | A | security-policy, cryptography | | Sigma HQ | https://github.com/SigmaHQ/sigma | 2 | A | detection-rules, siem | | tl;dr sec Newsletter | https://tldrsec.com | 1 | B | curated-security-newsletter | | CyberScoop | https://cyberscoop.com | 1 | B | policy, government | | Dark Reading | https://www.darkreading.com/ | 1 | B | noticias, ameaças-emergentes | | SecurityWeek | https://www.securityweek.com | 1 | B | vulnerabilities, breaches | | The Record | https://therecord.media | 1 | B | cybercrime, nation-state | > [!info] 15 fontes - Tiers 1-3 - Confiabilidade A-B --- ## Coleta & Pipeline ```mermaid graph TB RSS["📡 RSS/Atom<br/>91 fontes"] --> COLLECT["⚙ Coleta Paralela<br/>10 threads, cada 2h"] API["🔌 JSON APIs<br/>10 endpoints"] --> COLLECT TW["🐦 Twitter API v2<br/>9 pesquisadores"] --> COLLECT GH["📦 GitHub Atom<br/>5 repositorios"] --> COLLECT COLLECT --> DEDUP["🔄 Dedup + Merge"] DEDUP --> SCORE["📊 Scoring 0-100"] SCORE --> CLASS{"P1-P4"} CLASS -->|"P1-P3<br/>score ≥ 60"| FEED["📰 Living Feed"] CLASS -->|"Todos"| DIGEST["📋 Digest Diario"] API -.->|"cada 6h"| IOC["🎯 IOC Layer<br/>JSON estruturado"] classDef input fill:#1a3a5c,color:#fff,stroke:#2980b9 classDef process fill:#1a4a2a,color:#fff,stroke:#27ae60 classDef output fill:#4a3a1a,color:#fff,stroke:#f39c12 classDef ioc fill:#5a1a1a,color:#fff,stroke:#e74c3c class RSS,API,TW,GH input class COLLECT,DEDUP,SCORE,CLASS process class FEED,DIGEST output class IOC ioc ``` | Método | Fontes | Frequencia | Ferramenta | |--------|--------|-----------|------------| | RSS/Atom | 91 | cada 2h | Firecrawl + feedparser | | JSON API | 10 | cada 2h (KEV: 1h) | collect-feeds.py | | Twitter API v2 | 9 perfis | cada 4h | twitter-client.py | | GitHub Atom | 5 repos | cada 2h | feedparser | | IOC Feeds | 4 endpoints | cada 6h | collect-iocs.py | --- > [!tip] Inteligencia produzida com estas fontes > **[[_feed|Feed de Inteligência CTI]]** - rolling 30 dias, curadoria diária > **[[_weekly|Relatorios Semanais]]** - sintese semanal com análise editorial > **[[insights|Panorama de Ameaças LATAM]]** - visao executiva regional --- **Navegação:** [[readme|Hub]] · [[_feed|Feed]] · [[guide-learning|Aprender]] · [[guide-analyst|Analista]] · [[sources|Fontes]] · [[subscribe|Assinar]]