InInfoSec Write-upsbyAdam GossThreat Intelligence with MISP Part 7 — Exporting IOCsDiscover how to use the MISP API to export attributes as IOCs that you can upload to security tools for detection/blocking automatically.Nov 13, 2023Nov 13, 2023
InInfoSec Write-upsbyAdam GossThreat Intelligence with MISP Part 6 — Using the APILearn how to use the MISP API to get statistics, search for attributes and events, and visualize your data through the power of code!Nov 1, 2023Nov 1, 2023
InInfoSec Write-upsbyAdam GossThreat Intelligence with MISP: Part 5 — Searching and FilteringLearn to efficiently search and filter your events and attributes in your MISP instance to find threat intelligence important to you.Oct 16, 2023Oct 16, 2023
InInfoSec Write-upsbyAdam GossThreat Intelligence with MISP: Part 4 — Using FeedsLearn hot to add open-source threat intelligence feeds to your MISP instance to automate collecting and organizing your intelligence.Oct 9, 2023Oct 9, 2023
InInfoSec Write-upsbyAdam GossThreat Intelligence with MISP: Part 3 — Creating EventsLearn to start using MISP by creating events, adding context with galaxies and taxonomies, and adding filling them with attributes.Oct 2, 2023Oct 2, 2023
InInfoSec Write-upsbyAdam GossThreat Intelligence with MISP: Part 2 — Setting up MISPLearn how create your own cyber threat intelligence database and information sharing platform by installing and setting up MISP!Sep 18, 2023Sep 18, 2023
Adam GossCyber Threat Intelligence with MISP: Part 1 — What is MISP?Discover the premier open-source threat intelligence sharing platform, its key features, and how you can use it to elevate your security!Sep 11, 20231Sep 11, 20231