MISPProject's profile picture. MISP - Threat Sharing. An open source software and standards to share, create and validate threatintel and intelligence.
Mastodon @misp@misp-community.org

MISP (@[email protected])

@MISPProject

MISP - Threat Sharing. An open source software and standards to share, create and validate threatintel and intelligence. Mastodon @[email protected]

The MISP project maintains and offers a comprehensive knowledge base covering threat actors, ransomware groups, malware, and more. Even if you don't use MISP, you can now easily search across all MISP Project knowledge bases... search.misp-community.org #threatintel


MISP (@[email protected]) reposted

🚀 Kunai pushes further @MISPProject integration! New tool kunai-to-misp (github.com/kunai-project/…) lets you push Kunai logs to MISP (misp-project.org) for better threat intel sharing. #ThreatIntel #Linux #SOC #OpenSource #ThreatHunting

kunai_project's tweet image. 🚀 Kunai pushes further @MISPProject  integration!

New tool kunai-to-misp (github.com/kunai-project/…) lets you push Kunai logs to MISP (misp-project.org) for better threat intel sharing.

#ThreatIntel #Linux #SOC #OpenSource #ThreatHunting

MISP v2.5.3 and v2.4.201 released with numerous enhancements, bug fixes, and security improvements to strengthen threat information sharing capabilities. #cti #opensource #threatintelligence #misp #threatintel misp-project.org/2024/12/22/MIS…


MISP (@[email protected]) reposted

Further enhance phishing investigations with @MISPProject playbooks! 'URL Remediation' streamlines finding abuse contacts via AbuseFinder, @lookyloo_app , @FIRSTdotOrg , and RDAP, while reporting malicious sites to MSRC, Google Safe Browsing and Netcraft. github.com/MISP/misp-play…

cudeso's tweet image. Further enhance phishing investigations with @MISPProject playbooks! 'URL Remediation' streamlines finding abuse contacts via AbuseFinder, @lookyloo_app , @FIRSTdotOrg , and RDAP, while reporting malicious sites to MSRC, Google Safe Browsing and Netcraft. github.com/MISP/misp-play…
cudeso's tweet image. Further enhance phishing investigations with @MISPProject playbooks! 'URL Remediation' streamlines finding abuse contacts via AbuseFinder, @lookyloo_app , @FIRSTdotOrg , and RDAP, while reporting malicious sites to MSRC, Google Safe Browsing and Netcraft. github.com/MISP/misp-play…
cudeso's tweet image. Further enhance phishing investigations with @MISPProject playbooks! 'URL Remediation' streamlines finding abuse contacts via AbuseFinder, @lookyloo_app , @FIRSTdotOrg , and RDAP, while reporting malicious sites to MSRC, Google Safe Browsing and Netcraft. github.com/MISP/misp-play…
cudeso's tweet image. Further enhance phishing investigations with @MISPProject playbooks! 'URL Remediation' streamlines finding abuse contacts via AbuseFinder, @lookyloo_app , @FIRSTdotOrg , and RDAP, while reporting malicious sites to MSRC, Google Safe Browsing and Netcraft. github.com/MISP/misp-play…

MISP (@[email protected]) reposted

You can now browse the @MISPProject playbooks on GitHub Pages: misp.github.io/misp-playbooks/ . The playbooks are automatically converted into easy-to-navigate HTML pages. Dive in and explore!


MISP (@[email protected]) reposted

It’s been a while since I posted a new @MISPProject tip, but in the meantime you can now also enjoy the tips via a simple HTML page at cudeso.github.io/misp-tip-of-th…


SkillAegis version 1.2.0 released SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP. github.com/MISP/SkillAegi… #threatintel #training #cybersecurity #opensource


MISP 2.4.200 and 2.5.2 released - Post Hack.lu release with many new features. New feature such as Ad-Hoc Workflows, Private Custom Galaxies, Tags on Event Report, new features in event report & improved PDF export. misp-project.org/2024/11/19/MIS… #ThreatIntel #cti


MISP (@[email protected]) reposted

New features in vulnerability lookup includes sighting from different sources including @MISPProject communities. The example below is a vulnerability in Android but the CVE is not yet published. You can track the sighting evolution. vulnerability.circl.lu/vuln/CVE-2024-… #vulnerability #cve

circl_lu's tweet image. New features in vulnerability lookup includes sighting from different sources including @MISPProject communities. The example below is a vulnerability in Android but the CVE is not yet published.  You can track the sighting evolution.

vulnerability.circl.lu/vuln/CVE-2024-…

#vulnerability #cve

Investigating FortiManager Zero-Day Exploitation (CVE-2024-47575) MISP event circl.lu/doc/misp/feed-… Details about CVE-2024-47575 vulnerability.circl.lu/vuln/CVE-2024-… #misp #infosec #vulnerability #fortinet


MISP (@[email protected]) reposted

New conversion scripts bridge @MISPProject playbooks and CACAO (@OASISopen) security playbooks. Still an initial version but significantly simplifies integration between both formats. #CTI #automation #soar github.com/MISP/misp-play…

cudeso's tweet image. New conversion scripts bridge @MISPProject playbooks and CACAO (@OASISopen) security playbooks. Still an initial version but significantly simplifies integration between both formats. #CTI #automation #soar github.com/MISP/misp-play…
cudeso's tweet image. New conversion scripts bridge @MISPProject playbooks and CACAO (@OASISopen) security playbooks. Still an initial version but significantly simplifies integration between both formats. #CTI #automation #soar github.com/MISP/misp-play…
cudeso's tweet image. New conversion scripts bridge @MISPProject playbooks and CACAO (@OASISopen) security playbooks. Still an initial version but significantly simplifies integration between both formats. #CTI #automation #soar github.com/MISP/misp-play…
cudeso's tweet image. New conversion scripts bridge @MISPProject playbooks and CACAO (@OASISopen) security playbooks. Still an initial version but significantly simplifies integration between both formats. #CTI #automation #soar github.com/MISP/misp-play…

MISP (@[email protected]) reposted

Very nice! Visualisations are essential for understanding complex reports. Also see some ways on how to possibly integrate this in the future with @MISPProject reports and/or playbooks.

🤓 Do you remember my work last year on Threat Report summarization and Mindmap creation with GenAI? This time, I’ve taken it a step further with a dynamic diagram which is auto-populated and enriched with threat data! 🪄 The example below is based on the latest Microsoft…



MISP (@[email protected]) reposted

Some of the snippets of the CTF data and attachments imported into @MISPProject

_rectifyq's tweet image. Some of the snippets of the CTF data and attachments imported into @MISPProject
_rectifyq's tweet image. Some of the snippets of the CTF data and attachments imported into @MISPProject
_rectifyq's tweet image. Some of the snippets of the CTF data and attachments imported into @MISPProject
_rectifyq's tweet image. Some of the snippets of the CTF data and attachments imported into @MISPProject

MISP (@[email protected]) reposted

Obviously, it will also include some @MISPProject tips&tricks.

cudeso's tweet image. Obviously, it will also include some @MISPProject tips&tricks.

MISP (@[email protected]) reposted

I created a small script to extract unique hostnames and domains from the DDoSia configuration objects shared via @MISPProject . Post at vanimpe.eu/2024/10/08/ext… ; script: github.com/cudeso/tools/b… #DDOS

cudeso's tweet image. I created a small script to extract unique hostnames and domains from the DDoSia configuration objects shared via @MISPProject . Post at vanimpe.eu/2024/10/08/ext… ; script: github.com/cudeso/tools/b… #DDOS
cudeso's tweet image. I created a small script to extract unique hostnames and domains from the DDoSia configuration objects shared via @MISPProject . Post at vanimpe.eu/2024/10/08/ext… ; script: github.com/cudeso/tools/b… #DDOS

MISP (@[email protected]) reposted

Contact @circl_lu for getting access to the MISPPRIV instance - misp-project.org/communities/


Loading...

Something went wrong.


Something went wrong.