The detailed white paper is available here:
https://www.welivesecurity.com/wp-content/uploads/2020/05/ESET_Turla_ComRAT.pdf …
As usual, the Indicators of Compromise and a @MISPProject event are available on our GitHub repository:
https://github.com/eset/malware-ioc/tree/master/turla#turla-comrat-v4-indicators-of-compromise … #ESETresearch 4/4
#Cybersecurity remains a key driver in keeping our societies and economies secure, even in the face of a pandemic.
Here's a peek at our #cybersec research in 2019, including work on #bitcoin security, #whitebox encryption, & #UX with @MISPProject
http://ow.ly/aVQE50zEYUl pic.twitter.com/mUdxF1VRnl
So what did I learn about #ThreatIntel? Quite a bit!
1. First, props to the @MISPProject team for what they've created, and I look forward to using the platform enough to begin contributing
1/6
Following in @TheHive_Project and @MISPProject's, I've created a support community for Shuffle:
https://gitter.im/Shuffle-SOAR/community …
Added most of the @Secureworks threat actor names as synonyms to the @MISPProject galaxy today.
https://twitter.com/Secureworks/status/1263580691398197249 …
Thanks to Nils @0x3c7 and @Secureworks for the contribution. MISP threat-actor galaxy is updated, published on the website, available in core MISP and all tools using the MISP project galaxies.
https://twitter.com/0x3c7/status/1263889007374729221 …pic.twitter.com/zfP3DV6Pi0
How #MISP Enables the #Cybersecurity Community to Collaborate During the Pandemic
Now, with the addition of COVID-19 threat intelligence from Microsoft, @devo_Inc customers also have access to the latest hashes and signals about these threats.
https://www.devo.com/blog/how-misp-enables-the-cybersecurity-community-to-collaborate-during-the-pandemic/ …
Updated for Zeek (been on to-do list ). Export indicators from @MISPProject and use them for @Zeekurity Intel Framework and @snort/@Suricata_IDS rules in @securityonion:
https://securityonion.readthedocs.io/en/latest/misp.html …
Presentations of the EU ATT&CK Workshop are now online
https://attack-community.org/event/ . 1800 participants from 75 countries listening to inspiring, practical and useful content delivered by more than 35 speakers. #EUATTACKworkshop @MITREattack @MITREengenuity @circl_lu @CERTEU
Screenshots show integration with @MISPProject
@MISPProject is the top open-source threat-intelligence platform. Now @Microsoft has made a major contribution to fighting cyberthreats during the pandemic by sharing its COVID-19-related threat data. Everyone benefits when we all work together.
https://hubs.ly/H0qJXDw0
Slides are published on #CogSecCollab site :)
https://cogsec-collab.org/talk/2020_eu_attack/ …
Shuffle — an Open Source SOAR platform
https://medium.com/security-operation-capybara/introducing-shuffle-an-open-source-soar-platform-part-1-58a529de7d12 … Check out the demo at
https://shuffler.io/login
We are very proud to announce the schedule of this so special VIRTUAL #pts20 edition! You are going to be able to follow 15 talks about Free Software & Security grouped in 6 sessions (Detect & Defend, Securing Boxes, Cyborgs etc). Enjoy! :)
https://2020.pass-the-salt.org/schedule/ pic.twitter.com/oFsjTqRrlA
The #EUATTACKworkshop is again truly an oitstanding source of inspiration!
As an outcome of two excellent talks on Att&ck like matrices for the telco sector, the Bhadra framework (
https://arxiv.org/pdf/2005.05110.pdf …) is now part of the @MISPProject galaxies.
Thanks for all the ideas!pic.twitter.com/kaIalpiZq7
How easy is to create an @MITREattack like matrix in MISP? @Iglocska did it live during the #EUATTACKworkshop - don't hesitate to contribute new ones in MISP.
https://github.com/MISP/misp-galaxy/commit/43703f1a96f50d526d6d5ea2913d054baf47c8fa …
https://twitter.com/Iglocska/status/1262762417945116673 …
Released during the #EUATTACKworkshop: Visualizing ATT&CK data is now a click away in the #Maltego Transform Hub - thanks to @MITREattack, @MISPProject and @MaltegoHQ !pic.twitter.com/hxP6HNteQT
Don't miss this talk :) Very informative and interesting talk from @VV_X_7 and @bodaceacat about "AMITT - Adversarial Misinformation Playbooks" using @MISPProject, @TheHive_Project and @atc_project #EUATTACKworkshop @MITREattack @MITREengenuitypic.twitter.com/pjCv9A9Jub
The latest version of ThreatIngestor works well with @MISPProject.
https://pypi.org/project/threatingestor/ …
Thanks @InQuest guys for kindly reviewing my PRs.
Interesting intervention by @adulau on MiSP Galaxy2.0 and how it will Map and relate all the models inc Att&Ck framework #EUATTACKworkshoppic.twitter.com/4AESgFR2Pd
MISP - Threat Sharing. An Open Source software and standards to share, create and validate threatintel and intelligence.
#Infosec #Security #OpenSource