# Fontes de Inteligencia
Base de fontes abertas (OSINT) monitoradas continuamente pelo RunkIntel. Toda inteligencia publicada e derivada exclusivamente de fontes publicas, coletadas e curadas por pipeline automatizado.
> [!abstract]- Como Usar Este Registro
> Este registro documenta todas as **100+ fontes OSINT** monitoradas pelo RunkIntel, organizadas em 4 tiers por confiabilidade e frequência de coleta:
> - **Tier 1** (RSS/Blogs): Pesquisa original de vendors - coleta diária
> - **Tier 2** (APIs): NVD, CISA KEV, MSRC - coleta a cada 4 horas
> - **Tier 3** (Social): Reddit, Twitter/X - triagem diária
> - **Tier 4** (Feeds): IOCs, pulses, threat data - coleta a cada 6 horas
>
> Escala de confiabilidade: **A** (fonte primária) → **B** (secundária confiável) → **C** (verificar claims) → **D/F** (requer corroboração)
```mermaid
mindmap
root((100+ Fontes OSINT))
Vulnerabilidades 17
NVD
CISA KEV
VulnCheck
ZDI
Threat Intel 29
Mandiant
CrowdStrike
Unit 42
Securelist
LATAM e Brasil 18
CERT.br
Tempest
Apura
Redbelt
Supply Chain 7
Snyk
Socket.dev
Sonatype
IOC Feeds 6
Shadowserver
GreyNoise
ThreatFox
AI Threats 5
IBM X-Force
HiddenLayer
ICS e OT 6
Dragos
Claroty
Dark Web 3
Ransomware.live
Crypto 4
Chainalysis
SlowMist
Industria 15
Krebs
SANS ISC
CERTs Globais 5
NCSC UK
ANSSI
```
```mermaid
pie title Distribuição das 100+ Fontes por Categoria
"Threat Intel" : 29
"LATAM e Brasil" : 18
"Vulnerabilidades" : 17
"Industria" : 15
"Supply Chain" : 7
"IOC Feeds" : 6
"ICS/OT" : 6
"AI Threats" : 5
"CERTs Globais" : 5
"Crypto/DeFi" : 4
"Dark Web" : 3
```
> [!abstract] 100+ fontes únicas - 13 categorias - Tiers 1-4 - Confiabilidade A-C
> Coleta automatizada via RSS, JSON APIs, Twitter API v2 e GitHub Atom.
> Pipeline: **collect** (cada 2h) → **curaté** (scoring 0-100) → **enrich** → **publish**
---
## Escala de Confiabilidade
| Nivel | Significado | Uso no scoring |
|-------|-------------|----------------|
| **A** | Altamente confiavel - fonte primaria, pesquisa original | +30 pontos |
| **B** | Confiavel - fonte secundaria respeitavel, bom historico | +20 pontos |
| **C** | Geralmente confiavel - agregador, verificar afirmacoes-chave | +10 pontos |
---
## Vulnerabilidades & Exploits
> [!warning] Prioridade maxima - CVEs ativamente explorados, advisories e PoCs
> Fontes primarias para priorizacao de patches. Qualquer CVE no catalogo CISA KEV exige nota no vault em 24 horas.
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| BleepingComputer | https://www.bleepingcomputer.com/ | 1 | A | ransomware, breaches, exploits |
| NVD - NIST | https://nvd.nist.gov/ | 2 | A | cve, cvss, patches |
| CISA | https://www.cisa.gov/ | 2 | A | cve, kev, advisories |
| CISA Cybersecurity Advisories | https://www.cisa.gov | 2 | A | advisories, ics-cert, vulnerability-alerts |
| Cisco Security | https://sec.cloudapps.cisco.com/ | 2 | A | cve, advisories, network-security |
| GitHub Advisory Database | https://github.com/advisories | 2 | A | cve, supply-chain, dependencias |
| Google Project Zero | https://googleprojectzero.blogspot.com | 2 | A | zero-day, vulnerability-research |
| Microsoft MSRC | https://msrc.microsoft.com/ | 2 | A | cve, patch-tuesday, windows |
| Rapid7 | https://www.rapid7.com | 2 | A | vulnerabilities, exploitation, detection |
| Tenable | https://www.tenable.com | 2 | A | vulnerabilities, exposure-management |
| VulnCheck | https://vulncheck.com/blog | 1 | A | exploitability-scores, kev-faster |
| Zero Day Initiative | https://www.zerodayinitiative.com | 2 | A | zero-day, vulnerability-disclosure |
| Exploit Database | https://www.exploit-db.com | 2 | B | exploits, proof-of-concept |
| CERT-EU | https://cert.europa.eu | 2 | A | advisories, eu-threats |
| AttackerKB | https://attackerkb.com | 2 | B | community-severity, exploitability |
| FIRST EPSS | https://www.first.org/epss | 2 | A | exploit-probability, scoring |
| r/netsec | https://www.reddit.com/r/netsec | 3 | C | security-research, exploits |
> [!info] 17 fontes - Tiers 1-3 - Confiabilidade A-C
---
### CISA KEV
> [!important] Fonte prioritaria - Vulnerabilidades com exploração ativa confirmada
> O CISA Known Exploited Vulnerabilities (KEV) Catalog lista vulnerabilidades com exploração ativa confirmada. Criado em novembro de 2021 sob a BOD 22-01, e a referencia autoritativa global para priorizacao baseada em ameaças reais.
**Endpoint:** `https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json`
**Autenticação:** Nenhuma - **Formato:** JSON - **Verificação:** Horaria
| Metrica | Valor |
|---------|-------|
| Total de CVEs (dez/2025) | ~1.484 |
| Adicionadas em 2025 | 245 |
| CVEs com ransomware (2025) | 24+ |
**Combinacao ideal:** KEV (exploração confirmada) + CVSS (severidade) + EPSS (probabilidade) = visao completa de risco.
---
## Threat Intelligence Global
> [!danger] APTs, campanhas, espionagem e inteligencia estratégica
> Pesquisa original de grupos de ameaça, análise de campanhas e atribuicao. Fontes com maior valor analitico para perfis de threat actors e detecção de TTPs.
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| Bitdefender Labs | https://www.bitdefender.com/blog/labs | 1 | A | malware, apt, ransomware |
| Checkpoint Research | https://research.checkpoint.com/ | 1 | A | malware, mobile, apt |
| CrowdStrike | https://www.crowdstrike.com | 1 | A | apt, malware, threat-intelligence |
| Elastic Security Labs | https://www.elastic.co/security-labs | 1 | A | malware-analysis, detection-rules |
| Fortinet Threat Research | https://www.fortinet.com | 1 | A | malware, vulnerabilities |
| Google Threat Analysis Group | https://blog.google/threat-analysis-group | 1 | A | apt, nation-state, zero-day |
| Huntress | https://www.huntress.com | 1 | A | smb-threats, ransomware |
| Intel471 | https://intel471.com | 1 | A | cybercrime, underground |
| Kela | https://www.kelacyber.com | 1 | A | cybercrime, dark-web |
| Mandiant Blog (Google) | https://www.mandiant.com/resources/blog | 1 | A | apt, espionagem, incident-response |
| Microsoft Security Blog | https://www.microsoft.com/security/blog | 1 | A | apt, ransomware |
| Proofpoint | https://www.proofpoint.com | 1 | A | phishing, email-threats, apt |
| Recorded Future Blog | https://www.recordedfuture.com/blog | 1 | A | threat-intelligence, geopolitica |
| Red Canary | https://www.redcanary.com | 1 | A | detection-engineering, threat-detection |
| Securelist (Kaspersky) | https://securelist.com/ | 1 | A | apt, malware, latam |
| SentinelOne Labs | https://www.sentinelone.com/labs | 1 | A | apt, reverse-engineering |
| Talos Intelligence (Cisco) | https://blog.talosintelligence.com/ | 1 | A | threat-research, vulnerabilities |
| Trend Micro | https://www.trendmicro.com | 1 | A | malware, ransomware, apt |
| Unit 42 (Palo Alto) | https://unit42.paloaltonetworks.com/ | 1 | A | apt, malware-analysis |
| VirusTotal Blog | https://blog.virustotal.com | 2 | A | malware-analysis, tools |
| Volexity | https://www.volexity.com/blog/ | 1 | A | apt, memory-forensics |
| WithSecure Labs | https://labs.withsecure.com/ | 1 | A | apt, malware-analysis |
| Wiz Research | https://www.wiz.io/blog/tag/research | 1 | A | cloud-security, misconfigurations |
| Zscaler ThreatLabz | https://www.zscaler.com/blogs/security-research | 1 | A | cloud-threats, ransomware |
| DoublePulsar (Kevin Beaumont) | https://doublepulsar.com | 1 | A | critical-vulns, ransomware-analysis |
| Flare | https://flare.io | 1 | B | dark-web, exposure-management |
| MISP Project | https://www.misp-project.org | 2 | A | threat-sharing, iocs, standards |
| OTX AlienVault | https://otx.alienvault.com/ | 4 | B | iocs, threat-pulses |
| SOCRadar | https://socradar.io | 1 | B | dark-web, vulnerability-intelligence |
> [!info] 29 fontes - Tiers 1-4 - Confiabilidade A-B
---
## Supply Chain Security
> [!danger] Ataques a cadeias de suprimento de software - npm, PyPI, containers
> Comprometimento de pacotes open-source cresceu 38% em 2025-2026. Categoria completamente nova - nenhuma plataforma CTI em portugues cobre isso sistematicamente.
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| Snyk Blog | https://snyk.io/blog | 1 | A | npm, PyPI, dependency-vulns |
| Socket.dev Blog | https://socket.dev/blog | 1 | A | malicious-packages, real-time |
| Sonatype Blog | https://blog.sonatype.com | 1 | A | oss-supply-chain, repository-attacks |
| Checkmarx Security | https://checkmarx.com/blog | 1 | A | sast-sca, supply-chain-compromise |
| ReversingLabs Blog | https://www.reversinglabs.com/blog | 1 | A | binary-analysis, software-threats |
| Chainguard Blog | https://www.chainguard.dev/unchained | 1 | B | container-security, sbom |
| Phylum Blog | https://blog.phylum.io | 1 | B | npm-pypi, malicious-packages |
> [!info] 7 fontes - Tier 1 - Confiabilidade A-B
---
## IOC Feeds Operacionais
> [!warning] Indicadores de compromisso estruturados - IPs, hashes, URLs, dominos
> Feeds machine-readable que alimentam detecção automatizada. Coletados via JSON API dedicado (collect-iocs.py), separado do pipeline narrativo.
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| Shadowserver Foundation | https://www.shadowserver.org | 1 | A | honeypots, sinkholes, scanning-global |
| Censys Blog | https://censys.com/blog | 1 | A | internet-scanning, exposure-data |
| GreyNoise Blog | https://www.greynoise.io/blog | 2 | A | internet-noise, mass-exploitation |
| Spamhaus | https://www.spamhaus.org | 2 | A | ip-blocklists, botnet-tracking |
| ThreatFox (abuse.ch) | https://threatfox.abuse.ch | 4 | B | malware-iocs, c2-infrastructure |
| Pulsedive Blog | https://blog.pulsedive.com | 2 | B | ioc-enrichment, community-feeds |
> [!tip] IOC Layer
> IOCs sao coletados em camada separada do conteudo narrativo. Dados JSON normalizados sao armazenados em `_private/iocs/` e correlacionados com notas do vault automaticamente.
> [!info] 6 fontes - Tiers 1-4 - Confiabilidade A-B
---
## AI & Ameaças Emergentes
> [!danger] Ameaças a plataformas de IA, LLMs, adversarial ML e model attacks
> Phishing gerado por IA já representa ~60% dos vetores de acesso inicial. Mais de 300.000 credenciais de ChatGPT foram expostas em 2025. Categoria emergente e critica.
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| IBM Security Intelligence | https://securityintelligence.com | 1 | A | x-force, ai-threats, global-cti |
| HiddenLayer Research | https://hiddenlayer.com/research | 1 | A | ai-model-attacks, mlsec |
| Trail of Bits Blog | https://blog.trailofbits.com | 1 | A | security-research, ai-crypto-audit |
| OWASP Blog | https://owasp.org | 2 | A | llm-top-10, web-security |
| Protect AI Blog | https://protectai.com/blog | 1 | B | ai-platform-security, ml-pipeline |
> [!info] 5 fontes - Tiers 1-2 - Confiabilidade A-B
---
## Dark Web & Underground
> [!warning] Monitoramento de forums, Telegram, leak sites e mercados clandestinos
> Inteligencia sobre atividade de grupos de ransomware, vazamentos de dados e negociacao de acessos em mercados underground.
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| Searchlight Cyber | https://www.searchlightcyber.com/blog | 1 | B | dark-web-intelligence, underground |
| Ransomware.live | https://www.ransomware.live | 2 | B | ransomware-gangs, leak-sites, vitimas |
| deepdarkCTI (GitHub) | https://github.com/fastfire/deepdarkCTI | 3 | B | telegram, dark-web, leak-sites |
> [!info] 3 fontes - Tiers 1-3 - Confiabilidade B
---
## Crypto & DeFi Threats
> [!warning] Exploits em blockchain, DeFi hacks, crime on-chain e wallet malware
> Rastreamento de incidentes cripto, análise on-chain de pagamentos de ransomware e ataques a protocolos DeFi.
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| Chainalysis Blog | https://www.chainalysis.com/blog | 1 | A | crime-on-chain, ransomware-payments |
| SlowMist Blog | https://slowmist.medium.com | 1 | A | defi-hacks, wallet-malware |
| Rekt News | https://rekt.news | 2 | B | defi-exploit-post-mortems |
| BlockThreat Newsletter | https://blockthreat.substack.com | 2 | B | crypto-threat-intel |
> [!info] 4 fontes - Tiers 1-2 - Confiabilidade A-B
---
## LATAM & Brasil
> [!danger] Foco regional - ameaças com impacto direto no Brasil e America Latina
> Fontes primarias para CTI com recorte LATAM. Essenciais para cobertura de banking trojans, phishing nacional, ransomware em PT-BR e politica cibernetica brasileira. O Brasil concentrou 84% das atividades maliciosas detectadas na America Latina no primeiro semestre de 2025.
### Governo & CERTs Brasileiros
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| CERT.br | https://www.cert.br/ | 1 | A | incidentes-brasil, phishing, botnets |
| CTIR Gov | https://www.gov.br/ctir/pt-br | 1 | A | incidentes-governo-federal, alertas-criticos |
| CAIS/RNP | https://cais.rnp.br | 1 | A | rede-academica-brasil, segurança |
| ANPD | https://www.gov.br/anpd | 2 | A | lgpd, compliance-brasil, vazamentos |
| Anatel | https://www.anatel.gov.br/ | 2 | B | Telecom, regulatorio-brasil |
### Empresas Brasileiras de CTI
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| Tempest Security (SideChannel) | https://www.sidechannel.blog | 1 | A | banking-trojans, cibercrime-brasil |
| Apura Cyber Intelligence | https://apura.com.br | 1 | A | dark-web-brasil, fraudes, risco-digital |
| Redbelt Security Blog | https://www.redbelt.com.br/blog | 1 | A | pesquisa-original-brasil, ransomware-br |
| ISH Tecnologia | https://www.ish.com.br/blog | 1 | B | ransomware-brasil, threat-intelligence |
| Axur | https://blog.axur.com | 1 | B | risco-digital, fraude-marca, darkweb-brasil |
| Security Leaders BR | https://securityleaders.com.br | 2 | B | news-cibersegurança-brasil |
| FEBRABAN Portal | https://portal.febraban.org.br | 2 | A | fraude-financeira-br, banking-trojans |
### Cobertura LATAM Regional
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| Kaspersky LATAM Blog | https://latam.kaspersky.com/blog/ | 1 | A | latam, malware-bancario, fraude |
| Kaspersky ICS CERT | https://ics-cert.kaspersky.com | 1 | A | ics-ot-latam, infraestrutura-critica |
| ESET LATAM (WeLiveSecurity) | https://www.welivesecurity.com/la-es/ | 1 | A | latam-malware, apt, banking-trojans |
| SCILabs (Telmex - Mexico) | https://scilabs.mx | 1 | B | mexico-cti, latam-threat-research |
| LACNIC CSIRT | https://csirt.lacnic.net | 1 | A | latam-network-security, coordenacao |
> [!info] 18 fontes - LATAM/Brasil - Confiabilidade A-B
---
## ICS/OT & Infraestrutura Critica
> [!warning] Ameaças a sistemas industriais, OT/ICS, SCADA e infraestrutura critica
> Fontes especializadas em operational technology. Altamente relevantes para setores de energia, agua, manufatura e Telecom no Brasil.
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| Dragos | https://www.dragos.com/blog | 1 | A | ics-ot, threat-groups, annual-report |
| Nozomi Networks Labs | https://www.nozominetworks.com/labs | 1 | A | ot-iot, honeypot-telemetry |
| Claroty (Team82) | https://claroty.com/blog | 1 | A | cps-security, ics-vulnerabilities |
| ICS-CERT (CISA) | https://www.cisa.gov/topics/industrial-control-systems | 2 | A | scada, ics-advisories |
| Kaspersky ICS CERT | https://ics-cert.kaspersky.com | 1 | A | ics-malware, industrial |
| WaterISAC | https://www.waterisac.org | 1 | A | water-infrastructure, ot-threats |
> [!info] 6 fontes - ICS/OT especializado - Confiabilidade A
---
## Government & CERTs Globais
> [!abstract] Governos nacionais, CERTs soberanos e agencias reguladoras
> Fontes oficiais de governos com mandato defensivo nacional. Alta confiabilidade, publicacao regular de advisories e threat landscape reports.
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| JPCERT/CC | https://www.jpcert.or.jp/english/ | 1 | A | jápan-cert, apac-threats |
| NCSC UK | https://www.ncsc.gov.uk | 1 | A | uk-government, nation-state |
| ANSSI (France) | https://www.cert.ssi.gouv.fr/ | 1 | A | france-cert, espionagem |
| ENISA | https://www.enisa.europa.eu | 1 | A | eu-cybersecurity, regulation |
| BSI (Germany) | https://www.bsi.bund.de/EN/ | 1 | A | germany-cert, infrastructure |
> [!info] 5 fontes - Government/CERTs - Confiabilidade A
---
## Setor Financeiro & Saude
> [!abstract] ISACs e fontes de inteligencia setorial
> Information Sharing and Analysis Centers (ISACs) com foco em ameaças específicas por vertical.
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| FS-ISAC | https://www.fsisac.com/newsroom | 1 | A | financial-sector, banking-threats |
| Health-ISAC | https://www.health-isac.org | 1 | A | healthcare-sector, ransomware-hospitais |
| IC3 (FBI) | https://www.ic3.gov | 2 | A | fraud-statistics, cybercrime-trends |
> [!info] 3 fontes - Setor especializado - Confiabilidade A
---
## Malware & Ferramentas
> [!note] Amostras, IoCs, C2, sandbox e análise de malware
> Feeds de IoCs estruturados, rastreamento de familias de malware e análise técnica de artefatos maliciosos.
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| Malware Traffic Analysis | https://www.malware-traffic-analysis.net | 1 | A | pcap-analysis, network-forensics |
| Sophos X-Ops | https://sophos.com/en-us/blog | 1 | A | ransomware, incident-response |
| The DFIR Report | https://thedfirreport.com | 1 | A | intrusion-analysis, ransomware |
| ANY.RUN Blog | https://any.run/cybersecurity-blog | 1 | A | sandbox-intel, emerging-threats |
| Objective-See Blog | https://objective-see.org/blog.html | 1 | A | macos-malware, iocs, annual-report |
| Abuse.ch URLhaus | https://urlhaus.abuse.ch/ | 4 | B | urls-maliciosas, malware-distribution |
| FeodoTracker | https://feodotracker.abuse.ch/ | 4 | B | botnet-c2, banking-trojans |
| MalwareBazaar | https://bazaar.abuse.ch/ | 4 | B | malware-samples, hashes |
| The Hacker News | https://thehackernews.com/ | 1 | B | noticias, vulnerabilidades |
| TweetFeed | https://tweetfeed.live/ | 4 | B | iocs, hashes, urls-maliciosas |
> [!info] 10 fontes - Tiers 1-4 - Confiabilidade A-B
---
## Industria & Pesquisa
> [!abstract] Jornalismo, frameworks de detecção, pesquisadores independentes e comunidades
> Noticias especializadas, frameworks (Sigma, YARA, Nuclei), newsletters curadas e comunidades de pesquisa de segurança.
| Fonte | URL | Tier | Rel. | Foco |
|-------|-----|------|------|------|
| Atomic Red Team | https://github.com/redcanaryco/atomic-red-team | 2 | A | adversary-emulation, mitre-attack |
| Bellingcat | https://www.bellingcat.com | 1 | A | osint, geopolitics |
| F5 Labs | https://www.f5.com/labs | 1 | A | application-security, ddos |
| Krebs on Security | https://krebsonsecurity.com/ | 1 | A | fraude, cibercrime, breaches |
| LOLBAS Project | https://github.com/LOLBAS-Project/LOLBAS | 2 | A | living-off-the-land, evasion |
| MITRE ATT&CK Blog | https://medium.com/mitre-attack | 1 | A | mitre-attack, framework |
| Nuclei Templates | https://github.com/projectdiscovery/nuclei-templates | 2 | A | vulnerability-scanning |
| SANS Internet Storm Center | https://isc.sans.edu/ | 1 | A | alertas, ataques-em-curso |
| Schneier on Security | https://www.schneier.com | 1 | A | security-policy, cryptography |
| Sigma HQ | https://github.com/SigmaHQ/sigma | 2 | A | detection-rules, siem |
| tl;dr sec Newsletter | https://tldrsec.com | 1 | B | curated-security-newsletter |
| CyberScoop | https://cyberscoop.com | 1 | B | policy, government |
| Dark Reading | https://www.darkreading.com/ | 1 | B | noticias, ameaças-emergentes |
| SecurityWeek | https://www.securityweek.com | 1 | B | vulnerabilities, breaches |
| The Record | https://therecord.media | 1 | B | cybercrime, nation-state |
> [!info] 15 fontes - Tiers 1-3 - Confiabilidade A-B
---
## Coleta & Pipeline
```mermaid
graph TB
RSS["📡 RSS/Atom<br/>91 fontes"] --> COLLECT["⚙ Coleta Paralela<br/>10 threads, cada 2h"]
API["🔌 JSON APIs<br/>10 endpoints"] --> COLLECT
TW["🐦 Twitter API v2<br/>9 pesquisadores"] --> COLLECT
GH["📦 GitHub Atom<br/>5 repositorios"] --> COLLECT
COLLECT --> DEDUP["🔄 Dedup + Merge"]
DEDUP --> SCORE["📊 Scoring 0-100"]
SCORE --> CLASS{"P1-P4"}
CLASS -->|"P1-P3<br/>score ≥ 60"| FEED["📰 Living Feed"]
CLASS -->|"Todos"| DIGEST["📋 Digest Diario"]
API -.->|"cada 6h"| IOC["🎯 IOC Layer<br/>JSON estruturado"]
classDef input fill:#1a3a5c,color:#fff,stroke:#2980b9
classDef process fill:#1a4a2a,color:#fff,stroke:#27ae60
classDef output fill:#4a3a1a,color:#fff,stroke:#f39c12
classDef ioc fill:#5a1a1a,color:#fff,stroke:#e74c3c
class RSS,API,TW,GH input
class COLLECT,DEDUP,SCORE,CLASS process
class FEED,DIGEST output
class IOC ioc
```
| Método | Fontes | Frequencia | Ferramenta |
|--------|--------|-----------|------------|
| RSS/Atom | 91 | cada 2h | Firecrawl + feedparser |
| JSON API | 10 | cada 2h (KEV: 1h) | collect-feeds.py |
| Twitter API v2 | 9 perfis | cada 4h | twitter-client.py |
| GitHub Atom | 5 repos | cada 2h | feedparser |
| IOC Feeds | 4 endpoints | cada 6h | collect-iocs.py |
---
> [!tip] Inteligencia produzida com estas fontes
> **[[_feed|Feed de Inteligência CTI]]** - rolling 30 dias, curadoria diária
> **[[_weekly|Relatorios Semanais]]** - sintese semanal com análise editorial
> **[[insights|Panorama de Ameaças LATAM]]** - visao executiva regional
---
**Navegação:** [[readme|Hub]] · [[_feed|Feed]] · [[guide-learning|Aprender]] · [[guide-analyst|Analista]] · [[sources|Fontes]] · [[subscribe|Assinar]]