From b340d986d92b1d4bb038c394d644bfa398651423 Mon Sep 17 00:00:00 2001 From: NEZRI Ygal Date: Fri, 3 May 2024 13:49:47 +0200 Subject: [PATCH] Update RSS Sources and Filters Added new relevant RSS sources, removed obsolete ones, and enhanced banned word filters for optimized detection of cyber trends. The 'remove_banned_words' function has been updated to effectively remove domain names, special characters, and multiple versions. --- Watcher/Watcher/threats_watcher/core.py | 17 ++ .../threats_watcher/datas/banned_words.csv | 59 +++- .../Watcher/threats_watcher/datas/sources.csv | 281 ++++++++++++++---- Watcher/Watcher/watcher/settings.py | 2 +- 4 files changed, 294 insertions(+), 65 deletions(-) diff --git a/Watcher/Watcher/threats_watcher/core.py b/Watcher/Watcher/threats_watcher/core.py index 02c1a13..733e56f 100644 --- a/Watcher/Watcher/threats_watcher/core.py +++ b/Watcher/Watcher/threats_watcher/core.py @@ -189,6 +189,23 @@ def remove_banned_words(): # Remove '/' (sometimes regular expression don't catch this character) word = word.replace("/", "") + # Remove domain name + domain_extensions = [ + ".com", ".org", ".net", ".edu", ".gov", ".mil", + ".biz", ".info", ".name", ".pro", ".coop", ".museum", ".aero", ".int", ".jobs", ".mobi", ".tel", ".travel", + ".fr", ".uk", ".de", ".jp", ".cn", ".it", ".us", ".es", ".ca", ".au", ".nl", ".ru", ".br", ".pl", ".in", ".be", ".ch", ".se", ".mx", ".at", ".dk", ".no", ".fi", ".ie", ".nz", ".sg", ".hk", ".my", ".za", ".ar", ".tw", ".kr", ".vn", ".tr", ".ua", ".gr", ".pt", ".cz", ".hu", ".cl", ".ro", ".id", ".il", ".co", ".ae", ".th", ".sk", ".bg", ".ph", ".hr", ".lt", ".si", ".lv", ".ee", ".rs", ".is", ".ir", ".sa", ".pe", ".ma", ".by", ".gt", ".do", ".ng", ".cr", ".ve", ".ec", ".py", ".sv", ".hn", ".pa", ".bo", ".kz", ".lu", ".uy", ".dz", ".uz", ".ke", ".np", ".kh", ".zm", ".ug", ".cy", ".mm", ".et", ".ni", ".al", ".kg", ".bd", ".tn", ".np", ".la", ".gh", ".iq", ".bj", ".gm", ".tg", ".lk", ".jo", ".zw", ".sn", ".km", ".mw", ".md", ".mr", ".tn", ".bf", ".bi", ".sc", ".er", ".sl", ".cf", ".ss", ".td", ".cg", ".gq", ".dj", ".rw", ".so", ".ne", ".yt", ".re", ".pm", ".wf", ".tf", ".gs", ".ai", ".aw", ".bb", ".bm", ".vg", ".ky", ".fk", ".fo", ".gl", ".gp", ".gg", ".gi", ".je", ".im", ".mq", ".ms", ".nc", ".pf", ".pn", ".sh", ".sb", ".gs", ".tc", ".tk", ".vg", ".vi", ".um", ".cx", ".cc", ".ac", ".eu", ".ad", ".ax", ".gg", ".gi", ".im", ".je", ".mc", ".me", ".sm", ".va", ".rs", ".ps", ".asia", ".cat", ".coop", ".jobs", ".mobi", ".tel", ".travel" # Domaines de premier niveau géographiques (ccTLD) + ] + if any(word.endswith(ext) for ext in domain_extensions): + word = "" + + # Remove special characters + word = word.encode("latin1", errors="ignore").decode("utf-8", errors="ignore") + + # Remove version numbers in the format x.x.x + word = re.sub(r"\b\d+(?:\.\d+){2,}\b", "", word) + # Remove version numbers in the format vx.x.x + word = re.sub(r"v\d+(?:\.\d+){2,}", "", word) + if word: posts_without_banned[word] = count diff --git a/Watcher/Watcher/threats_watcher/datas/banned_words.csv b/Watcher/Watcher/threats_watcher/datas/banned_words.csv index d383cf2..5adeb80 100755 --- a/Watcher/Watcher/threats_watcher/datas/banned_words.csv +++ b/Watcher/Watcher/threats_watcher/datas/banned_words.csv @@ -796,4 +796,61 @@ xvjornadasccncert yourself zammad zataz -zero-day \ No newline at end of file +zero-day +importance +contracts +general +penetration +helps +premier +defense +lance +trust +strategy +tactics +benefits +practices +essential +identity +participating +controls +enhancing +weekly +episode +launches +utils +health +safety +landscape +collaboration +trends +steps +leaders +awards +managed +principal +spotlight +explained +comprehensive +performance +complete +prevention +publie +consultation +culture +essentials +basics +alerte +secteur +introducing +coffee +vistainfosec +requirement +requirements +ciblant +taosecurity +akamai +upguard +kaspersky +veracode +invicti \ No newline at end of file diff --git a/Watcher/Watcher/threats_watcher/datas/sources.csv b/Watcher/Watcher/threats_watcher/datas/sources.csv index 783d582..1d27607 100644 --- a/Watcher/Watcher/threats_watcher/datas/sources.csv +++ b/Watcher/Watcher/threats_watcher/datas/sources.csv @@ -1,63 +1,4 @@ source -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=DataSecuB&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=SecurityBeard&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=Sebdraven&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=r00tbsd&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=benkow_&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=binitamshah&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=malwareunicorn&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=UnderNews_fr&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=Dinosn&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=cyb3rops&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=hasherezade&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=x0rz&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=bartblaze&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=gentilkiwi&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=circl_lu&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=AHCybSec&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=chadtilbury&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=kafeine&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=malware_traffic&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=MalwareTechBlog&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=boolaz&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=tomchop_&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=CertSG&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=cert_ist&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=CERT_Polska_en&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=teamcymru&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=OnexteC&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=InfoSec_Geek&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=bulletproofsec&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=_odisseus&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=IT_securitynews&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=Securityartwork&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=Thirty5Tech&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=infosecstuff&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=1nf0s3cpt&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=mwtracker&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=everythingcybr&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=koczkatamas&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=tuxpanik&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=Lvanoel&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=HackRead&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=DynamicAnalysis&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=struppigel&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=sec_cyberalerts&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=icscyberalerts&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=sans_isc&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=MalwarePatrol&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=CTI_Marc&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=CVEnew&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=meadowmttech&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=TheHackersNews&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=CSAsingapore&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=CERTEU&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=0xcharlie&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=carhackvillage&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=defcon&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=ecrime_ch&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=SwitHak&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss -http://10.10.10.7/?action=display&bridge=Twitter&context=By+username&u=teamcymru_S2&norep=on&nopic=on&noimg=on&noimgscaling=on&format=Mrss https://krebsonsecurity.com/feed/ https://www.bleepingcomputer.com/feed/ https://securelist.com/feed/ @@ -80,7 +21,6 @@ https://feeds.feedburner.com/VmwareSecurityComplianceBlog https://linuxsecurity.com/linuxsecurity_articles.xml https://www.kaspersky.com/blog/category/threats/feed/ https://isc.sans.edu/rssfeed.xml -https://feeds.feedburner.com/TheHackersNews?format=xml https://www.theregister.com/security/headlines.atom https://www.kb.cert.org/vuls/atomfeed/ https://www.cyber.gov.au/acsc/view-all-content/advisories/rss @@ -90,13 +30,228 @@ https://www.jpcert.or.jp/english/rss/jpcert-en.rdf https://www.welivesecurity.com/category/malware,password,android-2,mobile-security,windows,mac,banking,linux/feed/ https://www.welivesecurity.com/feed/ https://securityaffairs.co/feed -https://www.mcafee.com/blogs/feed/ https://nakedsecurity.sophos.com/feed/ -https://www.zdnet.com/blog/security/rss.xml https://mcafee.com/blogs/feed -https://www.darkreading.com/rss.xml https://www.schneier.com/feed/atom/ https://www.incibe-cert.es/feed/avisos-seguridad/all https://www.ccn-cert.cni.es/component/obrss/rss-ultimas-vulnerabilidades.feed https://www.cyberveille-sante.gouv.fr/alertes-et-vulnerabilites/rss.xml https://feeds.feedburner.com/ZDI-Upcoming-Advisories +https://feeds.feedburner.com/thecyberexpress/cybernews +https://www.welivesecurity.com/fr/rss/feed/ +https://www.usine-digitale.fr/rss +https://www.darkreading.com/rss.xml +https://feeds.feedblitz.com/thesecurityledger +https://www.bankinfosecurity.com/rss-feeds +https://cybersguards.com/feed/ +https://isc.sans.edu/xml.html +https://feeds.feedburner.com/TheHackersNews +https://www.securityweek.com/feed/ +https://www.cyberdefensemagazine.com/feed/ +https://www.welivesecurity.com/en/rss/feed/ +https://binaryblogger.com/feed/ +https://www.govinfosecurity.com/rss-feeds +https://k12cybersecure.com/feed/ +http://www.hackersnewsbulletin.com/feed +https://cybersafe.news/feed/ +http://rss.techtarget.com/160.xml +https://news.sophos.com/feed/ +https://securitygladiators.com/web-stories/feed/ +https://www.lastwatchdog.com/feed/ +https://grahamcluley.com/feed/ +https://dankaminsky.com/feed/ +https://taosecurity.blogspot.com/feeds/posts/default?alt=rss +http://feeds.feedburner.com/akamai/blog +https://www.schneier.com/feed/ +https://www.hackingarticles.in/feed/ +http://feeds.feedburner.com/Liquidmatrix +https://blog.comodo.com/rss +https://www.helpnetsecurity.com/rss +https://www.csoonline.com/rss/ +https://www.scmagazine.com/rss +https://www.securityweek.com/rss +https://www.troyhunt.com/rss/ +https://marcoramilli.com/feed/ +https://www.zdnet.com/blog/security/rss.xml +https://perezbox.com/feed/ +https://blog.talosintelligence.com/rss/ +https://www.hackercombat.com/feed/ +https://www.andrewhay.ca/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.andrewhay.ca%2F&format=xml +https://www.flyingpenguin.com/?feed=rss2 +https://www.cio.com/feed/ +https://www.theguardian.com/media-network/information-security/rss +http://www.homelandsecuritynewswire.com/rss +https://www.ciolanding.com/feed/ +https://www.bitdefender.com/blog/api/rss/hotforsecurity/ +https://www.malwarebytes.com/blog/feed/index.xml +https://www.mcafee.com/blogs/feed/ +https://www.cnet.com/rss/news/ +https://www.cerias.purdue.edu/feeds/main +https://blog.knowbe4.com/rss.xml +https://www.technewsworld.com/feed/ +https://www.jisasoftech.com/feed/ +https://architectsecurity.org/feed/ +https://www.afcea.org/signal-articles-feed.xml +https://me.pcmag.com/en/feed.xml +http://www.computerworld.com/index.rss +https://www.itpro.com/rss-feeds +https://staysafeonline.org/feed/ +https://me.mashable.com/cybersecurity.xml +https://techcrunch.com/feed/ +https://sed-cms.broadcom.com/rss/v1/blogs/rss.xml +https://www.lemondeinformatique.fr/flux-rss/ +https://www.usine-digitale.fr/cybersecurite/rss +https://cyber.gouv.fr/actualites/feed +https://www.zataz.com/rss/zataz-news.rss +https://siecledigital.fr/feed/ +https://siecledigital.fr/cybersecurite/feed/ +https://www.bfmtv.com/rss/tech/ +https://www.futura-sciences.com/rss/actualites.xml +https://www.20minutes.fr/rss/une.xml +https://www.undernews.fr/feed +https://www.lagazettedescommunes.com/rubriques/actualite-club-informatique/feed/ +https://www.datasecuritybreach.fr/feed/ +https://www.argusdelassurance.com/rss/cyber/ +https://cybersecuritymag.africa/flux-rss-acm +https://www.frenchweb.fr/feed +https://www.radiofrance.fr/rss/societe/tech-web/cybersecurite +https://www.entreprises.gouv.fr/fr/rss/actualites +https://cyberscore-france.fr/feed/ +https://www.usinenouvelle.com/rss/cybersecurite/ +https://www.lesnumeriques.com/informatique/rss.xml +https://www.lemagit.fr/rss +https://blog.nameshield.com/fr/feed/ +https://www.journaldunet.com/rss.shtml +https://www.zataz.com/feed/ +https://www.informatiquenews.fr/feed +https://www.securitymagazine.com/rss/topic/2236 +https://portswigger.net/daily-swig/rss +https://cio.economictimes.indiatimes.com/rss/next-gen-technologies +https://cio.economictimes.indiatimes.com/rss/digital-security +https://cio.economictimes.indiatimes.com/rss/big-data +https://cio.economictimes.indiatimes.com/rss/cloud-computing +https://cio.economictimes.indiatimes.com/rss/internet-of-things +https://cio.economictimes.indiatimes.com/rss/enterprise-services-and-applications +https://cio.economictimes.indiatimes.com/rss/data-center +https://cio.economictimes.indiatimes.com/rss/consumer-tech +https://cio.economictimes.indiatimes.com/rss/internet +https://cio.economictimes.indiatimes.com/rss/artificial-intelligence +https://www.aha.org/aha-news-rss-feed +https://www.nist.gov/news-events/nist-rss-feeds +https://www.enisa.europa.eu/news/rss.xml +http://downloadcenter.trendmicro.com/index.php?clk=left_nav&clkval=rss_feed®s=GB +https://thecyberexpress.com/feed/ +https://www.cyber.gov.au/rss/alerts +https://cybersecurityventures.com/feed/ +https://www.tcc.edu/feed/ +https://it.wisc.edu/feed/ +https://ccb.belgium.be/en/rss +https://economictimes.indiatimes.com/rss.cms +https://www.cybersecuritydive.com/feeds/news/ +https://globalnews.ca/tag/cybersecurity/feed/ +https://www.defense.gov/DesktopModules/ArticleCS/RSS.ashx?max=10&ContentType=1&Site=945 +https://www.wired.com/feed/rss +https://cybersecuritynews.com/feed/ +https://services-numeriques.unistra.fr/rss/flux-exhaustif/?type=100 +https://ciso2ciso.com/feed/ +https://ventureinsecurity.net/feed +https://olukaiiisoshybrideducyber.tech/feed/ +https://www.varutra.com/feed/ +https://protegent360.com/blog/feed/ +https://medium.com/feed/@2ndsightlab +https://davinciforensics.co.za/cybersecurity/feed/ +https://cleanerone.trendmicro.com/blog/?utm_source=feedspot +https://simeononsecurity.ch/index.xml +https://olukaiiisosicyber.tech/f.atom +https://myturn.careers/blog/?utm_source=feedspot +https://cyble.com/feed/ +https://medium.com/feed/@vaceituno +https://personalprivacyonline.com/feed/ +https://stevensitservices.com/feed/ +https://cybersecurity.att.com/site/blog-all-rss +https://www.nist.gov/blogs/cybersecurity-insights/rss.xml +http://feeds.trendmicro.com/TrendMicroResearch +https://www.bleepingcomputer.com/feed +http://www.techrepublic.com/rssfeeds/topic/security/?feedType=rssfeeds +https://www.computerworld.com/uk/category/security/index.rss +https://www.proofpoint.com/us/rss.xml +https://www.scnsoft.com/blog/category/information-security/atom +https://trustarc.com/blog/feed/ +https://www.identityiq.com/feed/ +https://www.acunetix.com/blog/?utm_source=feedspot +https://blogs.quickheal.com/feed/ +https://www.webroot.com/blog/feed/ +https://blog.zonealarm.com/feed/ +https://www.upguard.com/blog/rss.xml +https://www.seqrite.com/blog/feed/ +https://blog.pcisecuritystandards.org/rss.xml +https://heimdalsecurity.com/blog/feed/ +https://sectigostore.com/blog/feed/ +http://securityaffairs.co/wordpress/feed +https://feeds.feedburner.com/govtech/blogs/lohrmann_on_infrastructure +https://www.itgovernance.co.uk/blog/category/cyber-security/feed +https://lab.wallarm.com/feed/ +https://www.tripwire.com/state-of-security/feed/ +https://www.secpod.com/blog/feed/ +https://www.cheapsslshop.com/blog/feed/ +https://www.cybertalk.org/feed/ +https://secureblitz.com/feed/ +https://www.binarydefense.com/feed/ +https://www.logpoint.com/en/feed/ +https://cyberhoot.com/category/blog/feed/ +https://socprime.com/feed/ +https://hackercombat.com/feed/ +https://www.pivotpointsecurity.com/feed/ +https://blog.securityinnovation.com/rss.xml +https://www.cyberdb.co/blog/?utm_source=feedspot +https://security.googleblog.com/?utm_source=feedspot +https://www.blackfog.com/feed/ +https://blog.entersoftsecurity.com/feed/ +https://tacsecurity.com/feed/ +https://privacysavvy.com/feed/ +https://www.netsparker.com/blog/rss/ +https://mazebolt.com/feed/ +https://blog.k7computing.com/?utm_source=feedspot +https://any.run/cybersecurity-blog/feed/ +http://www.veracode.com/blog/feed/ +https://www.helpnetsecurity.com/feed/ +https://www.cm-alliance.com/cybersecurity-blog/rss.xml +https://www.vistainfosec.com/feed/ +https://dataprivacymanager.net/feed/ +https://wesecureapp.com/feed/ +https://adamlevin.com/feed/ +https://be4sec.com/feed/ +https://www.erdalozkaya.com/feed/ +https://virtualattacks.com/feed/ +https://www.lynxtechnologypartners.com/blog/feed/ +https://cnsight.io/blog/feed/ +https://www.getcurricula.com/feed +https://www.idsalliance.org/feed/ +https://www.exploitone.com/feed/ +https://www.tsfactory.com/forums/blogs/category/infosec-digest/feed/ +https://www.cyberpilot.io/cyberpilot-blog/rss.xml +https://www.ignyteplatform.com/feed/ +https://www.canarytrap.com/feed/ +https://www.secureblink.com/rss-feeds/threat-feed +https://www.virtru.com/blog/rss.xml +https://www.empowerelearning.com/blog/feed/ +https://www.cybersecuritycloudexpo.com/feed/ +https://www.theguardian.com/technology/data-computer-security/rss +https://threatpost.com/feed/ +https://www.jbspeakr.cc/index.xml +https://medium.com/feed/@d0znpp +https://itsecuritycentral.teramind.co/feed/ +https://www.clearnetwork.com/feed/ +https://follow.it/haxf4rall1 +https://techtalk.pcmatic.com/feed/ +https://www.twingate.com/blog.rss.xml +https://blog.g5cybersecurity.com/feed/ +https://securityparrot.com/feed/ +https://www.cybercrimeswatch.com/feed/ +https://www.reveantivirus.com/blog/lan/en/feed +https://securitymadesimple.org/feed/ +https://zeno-sec.com/feed/ +https://aghiathchbib.com/feed/ +https://feeds.feedburner.com/ckdiii +https://blog.blackswansecurity.com/feed/ +https://blog.infinigate.co.uk/rss.xml \ No newline at end of file diff --git a/Watcher/Watcher/watcher/settings.py b/Watcher/Watcher/watcher/settings.py index 4123863..cba7fad 100755 --- a/Watcher/Watcher/watcher/settings.py +++ b/Watcher/Watcher/watcher/settings.py @@ -74,7 +74,7 @@ # Feed Parser Configuration POSTS_DEPTH = 30 -WORDS_OCCURRENCE = 10 +WORDS_OCCURRENCE = 7 # Example for daily watch : PostsDepth = 30 et WordsOccurrence = 5 # Example for a continuous watch : PostsDepth = 3 et WordsOccurrence = 8 # Example for a Monday morning watch : PostsDepth = 50 et WordsOccurrence = 0