home.social

#misp — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #misp, aggregated by home.social.

  1. This release includes a major new feature: a graph visualisation for the MISP standard and STIX format, making it easier to explore, understand, and present CTI data structures directly from JSON.

    CTI Transmute is an online service available at cti-transmute.org and also an open source project available on GitHub.

    The FIRST CTI 2026 conference in Munich was a great source of feedback for this release. Many of the improvements and new features introduced in v1.2 came directly from discussions, demonstrations, and feedback gathered during the event. Thank you to everyone who tested, commented, challenged ideas, and shared practical use cases.

    #cti #stix #misp #standard #interoperability #cybersecurity

    🔗 Release notes CTI Transmute github.com/MISP/cti-transmute
    🔗 Release notes misp-stix github.com/MISP/misp-stix/rele

  2. This release includes a major new feature: a graph visualisation for the MISP standard and STIX format, making it easier to explore, understand, and present CTI data structures directly from JSON.

    CTI Transmute is an online service available at cti-transmute.org and also an open source project available on GitHub.

    The FIRST CTI 2026 conference in Munich was a great source of feedback for this release. Many of the improvements and new features introduced in v1.2 came directly from discussions, demonstrations, and feedback gathered during the event. Thank you to everyone who tested, commented, challenged ideas, and shared practical use cases.

    #cti #stix #misp #standard #interoperability #cybersecurity

    🔗 Release notes CTI Transmute github.com/MISP/cti-transmute
    🔗 Release notes misp-stix github.com/MISP/misp-stix/rele

  3. This release includes a major new feature: a graph visualisation for the MISP standard and STIX format, making it easier to explore, understand, and present CTI data structures directly from JSON.

    CTI Transmute is an online service available at cti-transmute.org and also an open source project available on GitHub.

    The FIRST CTI 2026 conference in Munich was a great source of feedback for this release. Many of the improvements and new features introduced in v1.2 came directly from discussions, demonstrations, and feedback gathered during the event. Thank you to everyone who tested, commented, challenged ideas, and shared practical use cases.

    #cti #stix #misp #standard #interoperability #cybersecurity

    🔗 Release notes CTI Transmute github.com/MISP/cti-transmute
    🔗 Release notes misp-stix github.com/MISP/misp-stix/rele

  4. This release includes a major new feature: a graph visualisation for the MISP standard and STIX format, making it easier to explore, understand, and present CTI data structures directly from JSON.

    CTI Transmute is an online service available at cti-transmute.org and also an open source project available on GitHub.

    The FIRST CTI 2026 conference in Munich was a great source of feedback for this release. Many of the improvements and new features introduced in v1.2 came directly from discussions, demonstrations, and feedback gathered during the event. Thank you to everyone who tested, commented, challenged ideas, and shared practical use cases.

    #cti #stix #misp #standard #interoperability #cybersecurity

    🔗 Release notes CTI Transmute github.com/MISP/cti-transmute
    🔗 Release notes misp-stix github.com/MISP/misp-stix/rele

  5. This release includes a major new feature: a graph visualisation for the MISP standard and STIX format, making it easier to explore, understand, and present CTI data structures directly from JSON.

    CTI Transmute is an online service available at cti-transmute.org and also an open source project available on GitHub.

    The FIRST CTI 2026 conference in Munich was a great source of feedback for this release. Many of the improvements and new features introduced in v1.2 came directly from discussions, demonstrations, and feedback gathered during the event. Thank you to everyone who tested, commented, challenged ideas, and shared practical use cases.

    #cti #stix #misp #standard #interoperability #cybersecurity

    🔗 Release notes CTI Transmute github.com/MISP/cti-transmute
    🔗 Release notes misp-stix github.com/MISP/misp-stix/rele

  6. The Synthetic Exercise World Format provides fictional countries, companies, sectors, and threat actors with structured metadata for neutral CTI examples, exercises, interoperability tests, and standards documentation without referencing real-world sensitive entities.

    I just released version 1.0.

    #cti #opensource #misp #cybersecurity #threatintelligence #threatintel

    🔗 GitHub - github.com/MISP/Synthetic-Exer

  7. The Synthetic Exercise World Format provides fictional countries, companies, sectors, and threat actors with structured metadata for neutral CTI examples, exercises, interoperability tests, and standards documentation without referencing real-world sensitive entities.

    I just released version 1.0.

    #cti #opensource #misp #cybersecurity #threatintelligence #threatintel

    🔗 GitHub - github.com/MISP/Synthetic-Exer

  8. The Synthetic Exercise World Format provides fictional countries, companies, sectors, and threat actors with structured metadata for neutral CTI examples, exercises, interoperability tests, and standards documentation without referencing real-world sensitive entities.

    I just released version 1.0.

    #cti #opensource #misp #cybersecurity #threatintelligence #threatintel

    🔗 GitHub - github.com/MISP/Synthetic-Exer

  9. The Synthetic Exercise World Format provides fictional countries, companies, sectors, and threat actors with structured metadata for neutral CTI examples, exercises, interoperability tests, and standards documentation without referencing real-world sensitive entities.

    I just released version 1.0.

    #cti #opensource #misp #cybersecurity #threatintelligence #threatintel

    🔗 GitHub - github.com/MISP/Synthetic-Exer

  10. The Synthetic Exercise World Format provides fictional countries, companies, sectors, and threat actors with structured metadata for neutral CTI examples, exercises, interoperability tests, and standards documentation without referencing real-world sensitive entities.

    I just released version 1.0.

    #cti #opensource #misp #cybersecurity #threatintelligence #threatintel

    🔗 GitHub - github.com/MISP/Synthetic-Exer

  11. Drone and UAV Forensic

    This repository is designed to accelerate the forensic analysis of DIY FPV drones and to help automate technical reporting from seized or recovered artifacts.

    The goal is pragmatic: extract useful evidence faster, normalize outputs, and produce data that can be reused in reports or shared into investigative platforms such as MISP.

    🔗 github.com/CIRCL/Drone-Forensic

    #drone #uav #opensource #dfir #threatintelligence #threatintel #misp #digitalforensics

    @circl
    @misp

  12. Drone and UAV Forensic

    This repository is designed to accelerate the forensic analysis of DIY FPV drones and to help automate technical reporting from seized or recovered artifacts.

    The goal is pragmatic: extract useful evidence faster, normalize outputs, and produce data that can be reused in reports or shared into investigative platforms such as MISP.

    🔗 github.com/CIRCL/Drone-Forensic

    #drone #uav #opensource #dfir #threatintelligence #threatintel #misp #digitalforensics

    @circl
    @misp

  13. Drone and UAV Forensic

    This repository is designed to accelerate the forensic analysis of DIY FPV drones and to help automate technical reporting from seized or recovered artifacts.

    The goal is pragmatic: extract useful evidence faster, normalize outputs, and produce data that can be reused in reports or shared into investigative platforms such as MISP.

    🔗 github.com/CIRCL/Drone-Forensic

    #drone #uav #opensource #dfir #threatintelligence #threatintel #misp #digitalforensics

    @circl
    @misp

  14. Drone and UAV Forensic

    This repository is designed to accelerate the forensic analysis of DIY FPV drones and to help automate technical reporting from seized or recovered artifacts.

    The goal is pragmatic: extract useful evidence faster, normalize outputs, and produce data that can be reused in reports or shared into investigative platforms such as MISP.

    🔗 github.com/CIRCL/Drone-Forensic

    #drone #uav #opensource #dfir #threatintelligence #threatintel #misp #digitalforensics

    @circl
    @misp

  15. Drone and UAV Forensic

    This repository is designed to accelerate the forensic analysis of DIY FPV drones and to help automate technical reporting from seized or recovered artifacts.

    The goal is pragmatic: extract useful evidence faster, normalize outputs, and produce data that can be reused in reports or shared into investigative platforms such as MISP.

    🔗 github.com/CIRCL/Drone-Forensic

    #drone #uav #opensource #dfir #threatintelligence #threatintel #misp #digitalforensics

    @circl
    @misp

  16. Excited to share that the MITRE Fight Fraud Framework™ (F3) is now included in the default MISP galaxy and available across all MISP instances.

    F3 is a curated knowledge base of tactics and techniques used by financial fraud actors, helping analysts structure, share, and enrich fraud-related intelligence more effectively.

    A great step forward for the MISP community and for teams tracking financial fraud.

    🔗 github.com/MISP/misp-galaxy

    @misp
    @circl

    #misp #financialfraud #threatintel #threatintelligence #opensource
    #financial

  17. Excited to share that the MITRE Fight Fraud Framework™ (F3) is now included in the default MISP galaxy and available across all MISP instances.

    F3 is a curated knowledge base of tactics and techniques used by financial fraud actors, helping analysts structure, share, and enrich fraud-related intelligence more effectively.

    A great step forward for the MISP community and for teams tracking financial fraud.

    🔗 github.com/MISP/misp-galaxy

    @misp
    @circl

    #misp #financialfraud #threatintel #threatintelligence #opensource
    #financial

  18. Excited to share that the MITRE Fight Fraud Framework™ (F3) is now included in the default MISP galaxy and available across all MISP instances.

    F3 is a curated knowledge base of tactics and techniques used by financial fraud actors, helping analysts structure, share, and enrich fraud-related intelligence more effectively.

    A great step forward for the MISP community and for teams tracking financial fraud.

    🔗 github.com/MISP/misp-galaxy

    @misp
    @circl

    #misp #financialfraud #threatintel #threatintelligence #opensource
    #financial

  19. Excited to share that the MITRE Fight Fraud Framework™ (F3) is now included in the default MISP galaxy and available across all MISP instances.

    F3 is a curated knowledge base of tactics and techniques used by financial fraud actors, helping analysts structure, share, and enrich fraud-related intelligence more effectively.

    A great step forward for the MISP community and for teams tracking financial fraud.

    🔗 github.com/MISP/misp-galaxy

    @misp
    @circl

    #misp #financialfraud #threatintel #threatintelligence #opensource
    #financial

  20. Excited to share that the MITRE Fight Fraud Framework™ (F3) is now included in the default MISP galaxy and available across all MISP instances.

    F3 is a curated knowledge base of tactics and techniques used by financial fraud actors, helping analysts structure, share, and enrich fraud-related intelligence more effectively.

    A great step forward for the MISP community and for teams tracking financial fraud.

    🔗 github.com/MISP/misp-galaxy

    @misp
    @circl

    #misp #financialfraud #threatintel #threatintelligence #opensource
    #financial

  21. @threatchain general purpose siem, malcolm ids, debian server, opnsense - good combo imo, good licensing,. I may just refactor and use 500gb drives so cost will not be the limiting factor, you can use debian blends too but even some of these specialized apps won't have included forensics-full and this has a ton of super usefull sw, when you have the persistence partition going corner case use cases can be covered better than say something like a bootable iso #rational clear case #mw #smw #yacy 3jenkins #ntop-ng #misp #cms #lamp server #sbom #addons #app armor #selinux #ufw #fail2ban #hardened debian #pentoo

  22. @threatchain general purpose siem, malcolm ids, debian server, opnsense - good combo imo, good licensing,. I may just refactor and use 500gb drives so cost will not be the limiting factor, you can use debian blends too but even some of these specialized apps won't have included forensics-full and this has a ton of super usefull sw, when you have the persistence partition going corner case use cases can be covered better than say something like a bootable iso #rational clear case #mw #smw #yacy 3jenkins #ntop-ng #misp #cms #lamp server #sbom #addons #app armor #selinux #ufw #fail2ban #hardened debian #pentoo

  23. @threatchain general purpose siem, malcolm ids, debian server, opnsense - good combo imo, good licensing,. I may just refactor and use 500gb drives so cost will not be the limiting factor, you can use debian blends too but even some of these specialized apps won't have included forensics-full and this has a ton of super usefull sw, when you have the persistence partition going corner case use cases can be covered better than say something like a bootable iso #rational clear case #mw #smw #yacy 3jenkins #ntop-ng #misp #cms #lamp server #sbom #addons #app armor #selinux #ufw #fail2ban #hardened debian #pentoo

  24. @threatchain general purpose siem, malcolm ids, debian server, opnsense - good combo imo, good licensing,. I may just refactor and use 500gb drives so cost will not be the limiting factor, you can use debian blends too but even some of these specialized apps won't have included forensics-full and this has a ton of super usefull sw, when you have the persistence partition going corner case use cases can be covered better than say something like a bootable iso #rational clear case #mw #smw #yacy 3jenkins #ntop-ng #misp #cms #lamp server #sbom #addons #app armor #selinux #ufw #fail2ban #hardened debian #pentoo

  25. What really impresses me is the creativity still thriving around the MISP project. I maintain MISP warning-lists for years to help filter false positives, and this week @iglocska built a new stand-alone #rust application for fast warning-list lookups, independent of MISP.

    #rust #misp #cybersecurity #cti #threatintelligence #opensource

    @misp

    🔗 Source code of misp-feedback github.com/MISP/misp-feedback
    🔗 misp-warninglists github.com/MISP/misp-warningli

  26. What really impresses me is the creativity still thriving around the MISP project. I maintain MISP warning-lists for years to help filter false positives, and this week @iglocska built a new stand-alone #rust application for fast warning-list lookups, independent of MISP.

    #rust #misp #cybersecurity #cti #threatintelligence #opensource

    @misp

    🔗 Source code of misp-feedback github.com/MISP/misp-feedback
    🔗 misp-warninglists github.com/MISP/misp-warningli

  27. What really impresses me is the creativity still thriving around the MISP project. I maintain MISP warning-lists for years to help filter false positives, and this week @iglocska built a new stand-alone #rust application for fast warning-list lookups, independent of MISP.

    #rust #misp #cybersecurity #cti #threatintelligence #opensource

    @misp

    🔗 Source code of misp-feedback github.com/MISP/misp-feedback
    🔗 misp-warninglists github.com/MISP/misp-warningli

  28. What really impresses me is the creativity still thriving around the MISP project. I maintain MISP warning-lists for years to help filter false positives, and this week @iglocska built a new stand-alone #rust application for fast warning-list lookups, independent of MISP.

    #rust #misp #cybersecurity #cti #threatintelligence #opensource

    @misp

    🔗 Source code of misp-feedback github.com/MISP/misp-feedback
    🔗 misp-warninglists github.com/MISP/misp-warningli

  29. What really impresses me is the creativity still thriving around the MISP project. I maintain MISP warning-lists for years to help filter false positives, and this week @iglocska built a new stand-alone #rust application for fast warning-list lookups, independent of MISP.

    #rust #misp #cybersecurity #cti #threatintelligence #opensource

    @misp

    🔗 Source code of misp-feedback github.com/MISP/misp-feedback
    🔗 misp-warninglists github.com/MISP/misp-warningli

  30. We are happy to announce the release of MISP v2.5.36, which includes new geolocation and map visualisation capabilities, the continued development of the Overmind UI, a new interactive CLI shell UI, important security fixes, and installer improvements.

    #misp #cti #informationsharing #threatintel #opensource

    github.com/MISP/MISP/releases/

  31. We are happy to announce the release of MISP v2.5.36, which includes new geolocation and map visualisation capabilities, the continued development of the Overmind UI, a new interactive CLI shell UI, important security fixes, and installer improvements.

    #misp #cti #informationsharing #threatintel #opensource

    github.com/MISP/MISP/releases/

  32. We are happy to announce the release of MISP v2.5.36, which includes new geolocation and map visualisation capabilities, the continued development of the Overmind UI, a new interactive CLI shell UI, important security fixes, and installer improvements.

    #misp #cti #informationsharing #threatintel #opensource

    github.com/MISP/MISP/releases/

  33. We are happy to announce the release of MISP v2.5.36, which includes new geolocation and map visualisation capabilities, the continued development of the Overmind UI, a new interactive CLI shell UI, important security fixes, and installer improvements.

    #misp #cti #informationsharing #threatintel #opensource

    github.com/MISP/MISP/releases/

  34. We are happy to announce the release of MISP v2.5.36, which includes new geolocation and map visualisation capabilities, the continued development of the Overmind UI, a new interactive CLI shell UI, important security fixes, and installer improvements.

    #misp #cti #informationsharing #threatintel #opensource

    github.com/MISP/MISP/releases/

  35. I'm happy to announce the long-awaited first release of misp-modules-cli version 1.0.0.

    This initial release makes it nifty and convenient to use MISP expansion modules directly from the command line, whether you are working against a local or remote misp-modules service. The goal is simple: bring the power of misp-modules into a lightweight CLI workflow that is easy to script, automate, and integrate into daily analysis work.

    #misp #mispmodules #threatintelligence #threatintel #opensource #cli #cybersecurity #osint

    @misp

    🔗 Release note github.com/MISP/misp-modules-c
    :github: misp-modules-cli github.com/MISP/misp-modules-c
    :github: misp-modules github.com/MISP/misp-modules

  36. I'm happy to announce the long-awaited first release of misp-modules-cli version 1.0.0.

    This initial release makes it nifty and convenient to use MISP expansion modules directly from the command line, whether you are working against a local or remote misp-modules service. The goal is simple: bring the power of misp-modules into a lightweight CLI workflow that is easy to script, automate, and integrate into daily analysis work.

    #misp #mispmodules #threatintelligence #threatintel #opensource #cli #cybersecurity #osint

    @misp

    🔗 Release note github.com/MISP/misp-modules-c
    :github: misp-modules-cli github.com/MISP/misp-modules-c
    :github: misp-modules github.com/MISP/misp-modules

  37. I'm happy to announce the long-awaited first release of misp-modules-cli version 1.0.0.

    This initial release makes it nifty and convenient to use MISP expansion modules directly from the command line, whether you are working against a local or remote misp-modules service. The goal is simple: bring the power of misp-modules into a lightweight CLI workflow that is easy to script, automate, and integrate into daily analysis work.

    #misp #mispmodules #threatintelligence #threatintel #opensource #cli #cybersecurity #osint

    @misp

    🔗 Release note github.com/MISP/misp-modules-c
    :github: misp-modules-cli github.com/MISP/misp-modules-c
    :github: misp-modules github.com/MISP/misp-modules

  38. I'm happy to announce the long-awaited first release of misp-modules-cli version 1.0.0.

    This initial release makes it nifty and convenient to use MISP expansion modules directly from the command line, whether you are working against a local or remote misp-modules service. The goal is simple: bring the power of misp-modules into a lightweight CLI workflow that is easy to script, automate, and integrate into daily analysis work.

    #misp #mispmodules #threatintelligence #threatintel #opensource #cli #cybersecurity #osint

    @misp

    🔗 Release note github.com/MISP/misp-modules-c
    :github: misp-modules-cli github.com/MISP/misp-modules-c
    :github: misp-modules github.com/MISP/misp-modules

  39. I'm happy to announce the long-awaited first release of misp-modules-cli version 1.0.0.

    This initial release makes it nifty and convenient to use MISP expansion modules directly from the command line, whether you are working against a local or remote misp-modules service. The goal is simple: bring the power of misp-modules into a lightweight CLI workflow that is easy to script, automate, and integrate into daily analysis work.

    #misp #mispmodules #threatintelligence #threatintel #opensource #cli #cybersecurity #osint

    @misp

    🔗 Release note github.com/MISP/misp-modules-c
    :github: misp-modules-cli github.com/MISP/misp-modules-c
    :github: misp-modules github.com/MISP/misp-modules

  40. Das Land Hessen geht mit einer MISP-Instanz des Hessen3C einen wichtigen Schritt für die kommunale Informationssicherheit.

    🔎 Strukturierter IoC-Austausch ermöglicht ein gemeinsames Lagebild statt isolierter Reaktion.
    🟢 TLP:GREEN erlaubt die direkte Nutzung im SIEM (z. B. Detektion & Anreicherung).
    🤝 Kommunen werden Teil eines gemeinsamen Sicherheitsnetzwerks.

    Mehrwert:
    • bessere Detektion
    • weniger Blindflug
    • stärkere Zusammenarbeit

    ⚙️ Herausforderung: SIEM/TI-Betrieb ist für viele Kommunen kaum leistbar → ein landesweiter SOC-Dienst wäre ein logischer nächster Schritt.

    💡 Fazit: strategischer Baustein für vernetzte Informationssicherheit.

    hessen3c.de/meldungen-neuigkei

    #ITSicherheit #Kommunen #MISP #SIEM #SOC #Hessen

  41. Das Land Hessen geht mit einer MISP-Instanz des Hessen3C einen wichtigen Schritt für die kommunale Informationssicherheit.

    🔎 Strukturierter IoC-Austausch ermöglicht ein gemeinsames Lagebild statt isolierter Reaktion.
    🟢 TLP:GREEN erlaubt die direkte Nutzung im SIEM (z. B. Detektion & Anreicherung).
    🤝 Kommunen werden Teil eines gemeinsamen Sicherheitsnetzwerks.

    Mehrwert:
    • bessere Detektion
    • weniger Blindflug
    • stärkere Zusammenarbeit

    ⚙️ Herausforderung: SIEM/TI-Betrieb ist für viele Kommunen kaum leistbar → ein landesweiter SOC-Dienst wäre ein logischer nächster Schritt.

    💡 Fazit: strategischer Baustein für vernetzte Informationssicherheit.

    hessen3c.de/meldungen-neuigkei

    #ITSicherheit #Kommunen #MISP #SIEM #SOC #Hessen

  42. Das Land Hessen geht mit einer MISP-Instanz des Hessen3C einen wichtigen Schritt für die kommunale Informationssicherheit.

    🔎 Strukturierter IoC-Austausch ermöglicht ein gemeinsames Lagebild statt isolierter Reaktion.
    🟢 TLP:GREEN erlaubt die direkte Nutzung im SIEM (z. B. Detektion & Anreicherung).
    🤝 Kommunen werden Teil eines gemeinsamen Sicherheitsnetzwerks.

    Mehrwert:
    • bessere Detektion
    • weniger Blindflug
    • stärkere Zusammenarbeit

    ⚙️ Herausforderung: SIEM/TI-Betrieb ist für viele Kommunen kaum leistbar → ein landesweiter SOC-Dienst wäre ein logischer nächster Schritt.

    💡 Fazit: strategischer Baustein für vernetzte Informationssicherheit.

    hessen3c.de/meldungen-neuigkei

    #ITSicherheit #Kommunen #MISP #SIEM #SOC #Hessen

  43. Das Land Hessen geht mit einer MISP-Instanz des Hessen3C einen wichtigen Schritt für die kommunale Informationssicherheit.

    🔎 Strukturierter IoC-Austausch ermöglicht ein gemeinsames Lagebild statt isolierter Reaktion.
    🟢 TLP:GREEN erlaubt die direkte Nutzung im SIEM (z. B. Detektion & Anreicherung).
    🤝 Kommunen werden Teil eines gemeinsamen Sicherheitsnetzwerks.

    Mehrwert:
    • bessere Detektion
    • weniger Blindflug
    • stärkere Zusammenarbeit

    ⚙️ Herausforderung: SIEM/TI-Betrieb ist für viele Kommunen kaum leistbar → ein landesweiter SOC-Dienst wäre ein logischer nächster Schritt.

    💡 Fazit: strategischer Baustein für vernetzte Informationssicherheit.

    hessen3c.de/meldungen-neuigkei

    #ITSicherheit #Kommunen #MISP #SIEM #SOC #Hessen

  44. Das Land Hessen geht mit einer MISP-Instanz des Hessen3C einen wichtigen Schritt für die kommunale Informationssicherheit.

    🔎 Strukturierter IoC-Austausch ermöglicht ein gemeinsames Lagebild statt isolierter Reaktion.
    🟢 TLP:GREEN erlaubt die direkte Nutzung im SIEM (z. B. Detektion & Anreicherung).
    🤝 Kommunen werden Teil eines gemeinsamen Sicherheitsnetzwerks.

    Mehrwert:
    • bessere Detektion
    • weniger Blindflug
    • stärkere Zusammenarbeit

    ⚙️ Herausforderung: SIEM/TI-Betrieb ist für viele Kommunen kaum leistbar → ein landesweiter SOC-Dienst wäre ein logischer nächster Schritt.

    💡 Fazit: strategischer Baustein für vernetzte Informationssicherheit.

    hessen3c.de/meldungen-neuigkei

    #ITSicherheit #Kommunen #MISP #SIEM #SOC #Hessen

  45. 🛡️ New to #MISP? Events are the core building blocks — grouping indicators, context, and analysis into one shareable unit. Learn how to create, structure, and tag events effectively 👇 www.gomisp.com/post/events-... #ThreatIntelligence #SOC #CyberSecurity

    Events in MISP - Creating, Tag...