adulau, to opensource

The @misp project's extensive knowledge base, available at misp-galaxy.org, now features an interactive and dynamic graph. This new addition showcases graph relationships, enhancing your browsing experience with visible, dynamic connections. Plus, you can easily filter through these relationships to find exactly what you need.

#misp #threatintelligence #threatintel #threatactors #opensource #opendata

🔗 An example with the PROMETHIUM threat actor https://www.misp-galaxy.org/microsoft-activity-group/relations/5744f91a-d2d8-4f92-920f-943dd80c578f/
🔗 Threat actor galaxy https://www.misp-galaxy.org/threat-actor/

siem, to random

A short tutorial how to ingest STIX data into MISP - I ran into some oddities, and this might be of help to others too

https://blog.melinesieber.ch/posts/misp-building-bridges/
#misp #cti #stix

misp, to opensource

MISP 2.4.184 released with performance improvements, security and bugs fixes.

https://misp-project.org/2024/02/06/MISP.2.4.184.released.html/

Don't forget to update. It's easy, it's not a VPN gateway to update ;-)

https://www.misp-project.org/2024/02/06/MISP.2.4.184.released.html/

misp, to opensource
misp, to opensource

MISP 2.4.183 released with new ECS log feature, improvements and bugs fixed. Thanks to all the contributors.

https://www.misp-project.org/2024/01/09/MISP.2.4.183.released.html/

New MISP galaxy website has been released to easily navigate all the knowledge https://www.misp-galaxy.org/

adulau, to random

Cyber Toufan was finally added in the @misp MISP galaxy as a threat-actor.

Thanks to Mathieu Béligon for the recent contribution.

🔗 https://www.misp-galaxy.org/threat-actor/?h=cyber+toufan#cyber-toufan
🔗 if you want to contribute or update the thret-actor MISP galaxy https://github.com/MISP/misp-galaxy/blob/main/clusters/threat-actor.json

misp, to opensource

Using Zeek’s new JavaScript support for MISP integration.

With Zeek 6.0, experimental JavaScript support was added to Zeek, making Node.js and its vast ecosystem available to Zeek script developers to more easily integrate with external systems.

https://www.misp-project.org/2024/01/03/Zeek_JavaScript_MISP_Integration.html/

@zeek

misp, to infosec

The MISP galaxy is expanding rapidly. To facilitate easier navigation through its diverse clusters, we have developed a dedicated website.

🔗 Threat actor https://misp-galaxy.org/threat-actor/
🔗 https://misp-galaxy.org/

adulau, to opensource

In recent years, we have strived to update the MISP standard to ensure it remains stable, simple, and extensible. This effort benefits not only the MISP project but also other threat intelligence tools that utilise this format.

Our commitment is to maintain a stable long-term format that allows users to actively reuse the MISP standard without encountering disruptive changes. We are pleased to announce that our standard format is now being used by numerous software applications worldwide. Recently, we have made minor updates to various formats to incorporate necessary changes while ensuring that our current users are not adversely affected.

For more detailed information, please refer to the following links:

🔗 Core format https://www.misp-standard.org/rfc/misp-standard-core.html
🔗 Object template format https://www.misp-standard.org/rfc/misp-standard-object-template-format.html
🔗 Taxonomy format https://www.misp-standard.org/rfc/misp-standard-taxonomy-format.html
🔗 Galaxy format https://www.misp-standard.org/rfc/misp-standard-galaxy-format.html

🔗 For further details, visit our main website MISP standard website https://www.misp-standard.org/

The MISP standards are also published as I-Ds at the IETF for further dissemination.core, galaxy, object and taxonomy.

#threatintel #threatintelligence #opensource #openstandards #misp #infosec

@misp

misp, to opensource

MISP 2.4.182 has been released with new features, improvements bugs fixed and an important security fix.

https://www.misp-project.org/2023/12/22/MISP.2.4.182.released.html/

misp, to opensource

We included in the MISP Project galaxy the new MITRE ATLAS™ (Adversarial Threat Landscape for Artificial-Intelligence System) which can easily be used to describe adversary tactics and techniques based on real-world attack observations and realistic demonstrations from AI red teams and security groups

https://github.com/MISP/misp-galaxy/pull/908

@mitreattack

Thanks to Christophe Vandeplas for the great contribution!

#misp #threatintelligence #threatintel #opensource #artificialintelligence #ai

misp, to opensource

Current state of the MISP playbooks

The MISP playbooks address common use-cases encountered by SOCs, CSIRTs or CTI teams to detect, react and analyse intelligence received by MISP. The project started early 2023 and as we’re now ending the year it’s time to look back at its current state and get an early glimpse of the future features.

https://www.misp-project.org/2023/12/08/current-state-MISP-playbooks.html/

by @cudeso

misp, to infosec

A new and maintained MISP Docker image has been released as part of the MISP project.

Check it out here: https://github.com/MISP/misp-docker/pkgs/container/misp-docker%2Fmisp-docker

Thanks to @ostefano for his commitment and hard work.

adulau, to opensource

Over recent months, the MISP project has undergone significant enhancements and advancements. These developments extend beyond software upgrades, encompassing enrichments in the community-managed MISP standard base, including galaxies, warning-lists, and objects.

#misp #opensource #CommunityDriven #infosec #threatintel

@misp

🔗 https://www.misp-project.org/2023/11/26/MISP.2.4.179.released.html/

misp, to opensource

https://www.misp-project.org/2023/11/26/MISP.2.4.179.released.html/

MISP 2.4.179 released with a host of improvements a security fix and some new tooling. New steps taken towards LLM integration, Workflow improvements, performance improvements for large edit and many more...

misp, to opensource

The companion to MISP - Cerebrate version 1.17 has been released with new community management and orchestration features.

https://www.cerebrate-project.org/2023/11/05/Cerebrate-version-1.17-released.html

@cerebrate

adulau, to opensource

If you didn't look at the @misp playbook, you should. It's a gold mine of code and processes to improve your CTI pipelines using MISP.

🔗 https://github.com/MISP/misp-playbooks

Thanks to @cudeso for the continuous work on it.

https://infosec.exchange/deck/@cudeso/111330603464792134

misp, to opensource

MISP 2.4.178 released with many workflow improvements, enhancement and bugs fixed.

A huge thank to all the contributors.

https://www.misp-project.org/2023/10/30/MISP.2.4.178.released.html/

#opensource #ThreatIntelligence #threatintel #misp #cti

misp, to opensource

misp-wireshark v1.1 released including support for tshark, installation error and various improvements.

misp-wireshark is a Lua plugin intended to help analysts extract data from Wireshark and convert it into the MISP Core format

https://github.com/MISP/misp-wireshark

#misp #wireshark #ThreatIntelligence #opensource #networkanalysis #dfir

misp, to OSINT

We recently introduced two new MISP galaxies for supporting OSINT collection and analysis of guns/firearms:

Thanks to the contributors.

misp, to cryptocurrency
misp, to opensource
a, to opensource
@a@paperbay.org avatar

The generic data received rtl_433 (for 433.92 MHz, 868 MHz (SRD), 315 MHz, 345 MHz, and 915 MHz ISM bands has a pull-request to support the SigMF format. 😎

With the recent support of SigMF in MISP @misp then you can have a complete chain of SIGINT for specific frequencies (either decoded or undecoded ones).

🔗 https://github.com/merbanan/rtl_433/pull/2632

🔗 https://www.misp-project.org/2023/08/23/MISP_now_supports_Signal_Metadata_Format_Specification_SigMF.html/

misp, to infosec

If you are curious about the extensive capabilities in MISP automation from API to complex workflow. You might want to watch our latest training session:

https://www.youtube.com/watch?v=2tmjLsPrQkI

keefer, to random

Newb #misp question:

Are there any best practices or recommendations around when you would re-use an event id for a feed, vs having a new event id for each time the feed updates?

The CSV and Freetext feed types allow you to specify a Fixed Event. Is this the default / recommended behavior?

#threatintel

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines