Update On MISP - Alex Dulaunoy @adulau @MITREattack
Get up and running with MISP in less than 1 minute! Demo:
MISP 2.4.119 has been released with many improvements in the API, a security fix for CVE-2019-19379 and various changes. New MISP expansion, import and export modules were introduced. #ThreatIntel #CTI #CyberSecurity
We have a new galaxy and object to express dark patterns in MISP. A good example of using MISP to model and share new threats targeting users.
Thanks to @gallypette (@circl_lu) and @b0rce (@uni_lu)
That’s why we have @MISPProject @secin_lu
Thanks to @ostefano from @lastlineinc for the new MISP modules to support Lastline as import, export and expansion service.
We have an ongoing MISP User Experience Survey together with the @uni_lu (@b0rce) - Don't hesitate to participate, it will help us to improve the UX experience of MISP. @circl_lu
Have you already signed up for the first BelgoMISP Meeting 0x01 meeting on 13-Dec?
Submitted a talk on threat hunting with @MISPProject and @Zeekurity #TheSAS2020
Want to see CALDERA and a hacker attack in your environment. Watch the Monster light up like a Christmas tree. It's Free @TheHive_Project @patrowl_io @MITREattack @MISPProject @OpenDistroForES @BlackHatUK Sound uppic.twitter.com/fuHID5bm4b
New MISP expansion modules added to support the submission to AssemblyLine - http://misp.github.io/misp-modules/expansion/#assemblyline_submit … https://bitbucket.org/cse-assemblyline/ … done by @chrisred_68 from @circl_lu during the #GeekWeek organised by @cybercentre_capic.twitter.com/MUIvrLSqIz
Another expansion module is available in MISP to query back AssemblyLine and parse the submission - https://github.com/MISP/misp-modules/blob/master/misp_modules/modules/expansion/assemblyline_query.py …https://twitter.com/MISPProject/status/1199032889754767361 …
A Mastodon instance for Luxembourg and beyond.