Show more

The Spear phishing Attack analytics with Threat Intel Platform. Thanks @MISPProject for the new insight for the Incident Response.
twitter.com/MISPProject/status …

We have been busy during holidays and the next release (for tomorrow) will include a new timeline feature in MISP. All attributes and objects can now have a first_seen and last_seen. A convenient timeline editor/viewer is now included to see all activities based on time.pic.twitter.com/uVukhfY4LD

A nice example of spear phishing attempts on a MISP event displayed on the new timeline visualisation. .twitter.com/OHDcqy3kE8

Want to create your own custom threat feed to enrich your security data in @elastic? Check out this post on using the @MISPProject API + Python and Memecached.
securitydistractions.com/2019/ …

We are glad to see analysts using MISP threat-actor knowledge base to do further research. Based on such research, we are then able to improve the MISP threat-actor list.
github.com/MISP/misp-galaxy/co …pic.twitter.com/gT8dd8EAC1

My code got merged!!! I am officially a contributor to the @MISPProject!!! @th3_jiv3r and I will hopefully be sharing some more of our custom integrations. I am so happy to contribute to such an awesome open source tool!
twitter.com/rafi0t/status/1218 …

Our network telemetry engine VAST supports full correlation between PCAP, NetFlow, @zeekurity, and @Suricata_IDS. High-volume ingestion plus fast data extraction. Built for SecOps and SOCs where performance matters. Coming soon: line-rate IoC matching and @MISPProject support.

We setup a mirror of the MISP git repositories for the users and organisations who would like (or need) to download from Europe.

misp-project.org/license/#expo …

eugit.opencloud.lu/MISP  Thanks to @Vecchi_Paolo for hosting the mirror at
opencloud.lu 

it's merged! @turtlefac3 and i are now contributors to the PyMISP project! looking forward to adding more of our custom @MISPProject integrations!

Day:14 I got my Go program to get the response from my get request to the VAP Proofpoint API. I am going to start writing it in Python now so @th3_jiv3r and me can contribute more to the @MISPProject. The code will send parsed json to MISP. @proofpoint

MISP trainings the 18th and 19th February in Luxembourg (@C3_Luxembourg) by @circl_lu Don't wait to register and join us.

misp-project.org/events/#curre …pic.twitter.com/AKjJ46Bev6

How can analysts operationalize threat intelligence at scale? Learn about the @MISPProject community-based approach to consuming, collecting and sharing in this @DarkReading article by Sebastian @Tricaud of Devo.
hubs.ly/H0myQ7s0 

Contact me if you want to try out (beta) ATT&CK - in using remote transforms. No local python install needed. @MITREattack @MISPProject

We created specific data models in the open source @MISPProject to support the sharing of dark patterns. If you see additional patterns or extension, let us know.
misp-project.org/galaxy.html#_ … cc @gallypette

A good paper about "Cyber Threat Information Sharing: Perceived Benefits and Barriers" my only disagreement is to add "free riding" as a barrier in information sharing. It's not, it means that the information shared is gathered & used to improve security at large. .twitter.com/6yhPvFI1Bb

misp-modules are regularly expanding with new modules and we are glad to see vendors having a very good documentation about MISP integration with their services such as the
macaddress.io/api/integrations …
macaddress.io  documentation for the MISP modules.
misp.github.io/misp-modules/ex …pic.twitter.com/jdOwZnzAsr

A new decaying model has been added in @MISPProject for the vishing/scam phone numbers. MISP has a flexible model system library for expiring/decaying indicators/attributes. You can easily contribute additional models to support your usage.

github.com/MISP/misp-decaying- …pic.twitter.com/wKIzW1VnZu

Show more
OpenCloud Luxembourg Mastodon instance

A Mastodon instance for Luxembourg and beyond.