
Norwegian MISP Users
@norwegianmisp
The Norwegian MISP Community
ID: 1220831075393470465
24-01-2020 22:09:58
103 Tweet
75 Followers
176 Following






The indicators from CrowdStrike (and others) on the compromise of the 3CX desktop app have been published via the MISP (@[email protected]) OSINT feed of botvrij.eu. You can also get them directly at botvrij.eu/data/feed-osin… #3CXpocalypse #3CX


A MISP (@[email protected]) tip of the week: MISP objects are a powerful way to add contextually linked attributes to threat events. And it's available via PyMISP. Use this notebook as a starter or learn how to add your own custom objects. github.com/cudeso/misp-ti… misp-project.org/2021/03/17/MIS…


How to do the MISP (@[email protected]) to Microsoft Security Azure Sentinel integration with PyMISP? Read the blog post at misp-project.org/2023/04/03/MIS… #cti




🚨🚨🚨 Whatever you were thinking about CVE-2023-20198 (#Cisco IOS EX) it's 100x worst. We used Cisco Talos Intelligence Group IOC check and found ~30k implants. That's 30k devices infected (routers, switches, VPNs), under the control of threat actors. That's excluding rebooted devices.



If you're interested to get some tips & tricks on how to use VirusTotal as a #SOC analyst or Incident Responder, check out these VirusTotal Academy video playlist youtube.com/playlist?list=…. I hope you enjoy them! #CyberSecurity #infosecurity #ThreatIntel #cyberthreatintelligence




