I wrote up how to use @Microsoft’s new #COVID19 threat feed with @MISPProject and/or Sentinel.
https://aka.ms/msft-covid19-misp …
If you want to run your own @MISPProject server to consume threat intel feeds - here is a blog describing how to stand one up and add the Microsoft COVID-19 feed as well as instructions on how automatically ingest data from MISP into Azure #Sentinel
https://techcommunity.microsoft.com/t5/azure-sentinel/integrating-open-source-threat-feeds-with-misp-and-sentinel/ba-p/1350371 …
Upgrade successfully on @MISPProject :)pic.twitter.com/8leKIXID9c
The SnT Annual Report is out! Learn more about our strategic research areas, activities and interdisciplinary projects, such as our work on @MISPProject in collaboration with @circl_lu @secin_lu (p. 30)
https://twitter.com/snt_uni_lu/status/1260532900619059200 …
We had a technical issue with the live MISP virtual training session. So we will record it again in the next hours and publish it very soon. Sorry to all the live participants.
https://twitter.com/MISPProject/status/1257241383456342018 …pic.twitter.com/t1KDCF2uqN
The virtual MISP training session will start in 10 minutes
https://twitter.com/MISPProject/status/1257241383456342018 … if you registered, don't forget to join in.
Cool intro for those looking to get started with @MISPProject
https://twitter.com/J_M_Schroeder/status/1258405776521072646 …
My @MISPProject FeedGen scripts will now only update the MISP Format JSON files if they need updating. This means, at least the JSON files can be cached.
https://github.com/coolacid/misp_feedgen …
AWS AMI's for @MISPProject have been updated to include 2.4.125!
Images are now also available in AWS us-east-2 (Ohio)
Project page:
https://github.com/MISP/misp-cloud
https://twitter.com/MISPProject/status/1258086914047053824 …
MISP project will talk at EU ATT&CK Community workshop. Don't hesitate to register, it's a fantastic community on how people are using contextualisation in threat intelligence and especially using the @MITREattack model.
https://twitter.com/FDezeure/status/1258309708282318848 …
The agenda of the EU ATT&CK Community workshop is online now
https://attack-community.org/event/ . Registration is open until this weekend. @CERTEU @MITREattack @circl_lu
The video recording of the CIRCL AIL Training is now online
https://peertube.opencloud.lu/videos/watch/b8cf2c67-df7b-4abc-a81c-a5b381144a20 … Thanks to all the participants and @Vecchi_Paolo for the video hosting.
https://twitter.com/circl_lu/status/1254780794830086144 …
I am speaking on Sightings use cases at #FirstCTI in less than 2 hours:
https://www.first.org/events/webinars/cti-may2020/ …
MISP 2.4.125 has been released with self-registration feature, feed improvements and many improvements.
https://www.misp-project.org/2020/05/06/MISP.2.4.125.released.html … #ThreatIntelligencepic.twitter.com/qqXnPhJxaQ
"Turning Data into Actional Intelligence - Advanced Features in MISP Supporting Your Analysts and Tools" will be presented by @adulau and @Iglocska tonight during @FIRSTdotOrg Cyber Threat Intelligence Webinar Series
https://www.first.org/events/webinars/cti-may2020/program#pTurning-Data-into-Actional-Intelligence-Advanced-Features-in-MISP-Supporting-Your-Analysts-and-Tools …
A great learning opportunity for CTI
https://twitter.com/MISPProject/status/1257241383456342018 …
Would you like to integrate MISP into Splunk Enterprise Security Threat Intel framework? I put together an app based on the COVID MISP instance to do that...
https://lnkd.in/ecdDqTJ
Need a little assistance integrating threat indicators with MISP and Splunk Enterprise Security? Lucky for you, @stonerpsu is here to help. He shares a step-by-step guide in the latest installment of our ‘Dear Buttercup’ series:
https://splk.it/2yZgpjg #SplunkSecuritypic.twitter.com/jmiQXwfGEz
MISP Virtual Session - MISP training course 2020 - Introductory training (Friday 8th May 2020 - 15:00-17:00 CET)
https://www.misp-project.org/events/#misp-virtual-session---misp-training-course-2020 … - Registration
https://www.xing-events.com/PKNIMHQ.html
A small reminder for the ones who want to join the MISP sharing community about #COVID19 threat intelligence. The self registration is available there ->
https://covid-19.iglocska.eu/users/register
MISP - Threat Sharing. An Open Source software and standards to share, create and validate threatintel and intelligence.
#Infosec #Security #OpenSource