-
-
MalSilo - Intel feeds on the cheap - powered by
#MISP backend@MISPProject https://raw-data.gitlab.io/post/feeds/ -
Check out the latest version of MISP-Dashboard from the
#MISP project to see how gamification of#CTI could benefit your org.https://vvx7.io/posts/2019/07/misp-gamification-in-cyber-threat-intelligence/ … -
Create objects from a CSV file (multiple object types in the same CSV)
@MISPProject#misp#threatintelhttps://github.com/geekscrapy/misp-batchobjects … -
Just a little update of the guidelines for
#Misp tools An XML file is also disponible for any change@circl_lu Software :#drawiopic.twitter.com/zCeEAD6TFc
Prikaži ovu nit -
Quick guide to writing your own MISP modules in
#python,#typosquatting edition#misp#threatintelhttps://medium.com/ouspg/quick-guide-to-writing-misp-modules-c53c7bb00914 … -
MISP dashboard v1.2 has been released https://github.com/MISP/misp-dashboard/releases/tag/v1.2 … including new filtering features, diagnostic tools and bug fixes.
#threatintel#misp pic.twitter.com/Sh3jiNYvEJ
-
#MISP -dockerized · @DCSO_de released a new @MISPProject @Docker Version. Check it out. Run it. Test it. And please provide us with feedback.https://github.com/DCSO/MISP-dockerized/releases … -
Did you know that the MITRE ATT&CK framework is already available in Maltego?
#MISP-maltego and#MISP-galaxies magic!@MITREattack@paterva@MISPProjectpic.twitter.com/yNRxZjX9WH
-
Some examples in a Mindmap format on how
@MISPProject (Malware Information and Threat Intelligence Sharing Platform) can be used and leveraged. In example, to feed early warning systems in your defensible security architecture https://github.com/caschnee/misp-use-cases …#BlueTeam#MISP#CyberDefensepic.twitter.com/EZiCXfGc6V
-
Updated the notebook with support for pipes. Each extracted IOC will run through the configured pipes and first pipe supported is
#MISP. Each matched IOC will show link to the related MISP event. https://github.com/nl5887/notebooks/blob/master/radare2/IOC%20extractor.ipynb …pic.twitter.com/IamtSJryZj
-
Using Threat data in your vulnerability management strategy with MISP
#MISP#VulnerabilityManagement#PatchManagement#itsikkerhed#sharingiscaring#ThreatIntelligencehttps://www.ecrimelabs.com/blog/2019/9/2/using-threat-data-in-your-vulnerability-management-strategy … -
I wrote something about
#autoit#crypter, process hollowing#shellcode and how samples were chased inside#MalSilo also thanks to#MISP. https://raw-data.gitlab.io/post/autoit_fud/ …Prikaži ovu nit -
finally back at home from
#MISP training. Amazing project, thank you!@MISPProjectpic.twitter.com/x5htV7W1dx
-
PISAX project will allow
@LU_CIX and POST#Luxembourg to have an automated & secure threat intelligence sharing system on platform#MISP
will facilitate that Institut Luxembourgeois de Régulation receive incident notifications
https://europa.eu/!Ct68Wy #CEFTelecom#CyberSecMonthpic.twitter.com/ZnZS18ZtSN
-
@cvandeplas is presenting how to visualize MISP (#Malware) data in#Maltego today at@MISPProject Summit 2019. Don't miss the session: https://cfp.hack.lu/tsc19/talk/LZD98G/ …@hack_lu#MISP -
Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed. https://www.ecrimelabs.com/blog/2019/6/4/encriching-carbonblack-response-with-threat-data-from-misp …
#threatintelligence#threatsharing#itsikkerhed#MISP#carbonblack -
very nice
especially the API connection from http://tweettioc.com
@MISPProject there may already be an import script for#MISP https://twitter.com/fatihsirinnnn/status/1193496300337152000 …
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
Source from 