sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

598
active users

#misp

1 post1 participant1 post today

When I added the threat-actor @misp galaxy type on Mar 4, 2016, I didn’t expect that, years later, vendors would still invent new names for already known threat actors, avoid using UUIDs, reuse similar names for different actors, and create confusing names by mixing tools or software used by the actors.

That’s why we continue the tedious work of maintaining a proper threat-actor database, with relationships to other galaxies such as MITRE ATT&CK, Malpedia, and more.

After years of this monastic effort, we’re seeing the benefits—many open-source and proprietary tools now rely on the MISP galaxy, which serves as both an open standard and a public knowledge base.

We also maintain a dedicated website for all MISP galaxies. Here’s an example from the threat-actor database:
misp-galaxy.org/threat-actor/r

:github: Repository github.com/MISP/misp-galaxy/
🌐 Public website misp-galaxy.org/threat-actor/

If you’d like to become a monk (just kidding!) and contribute, feel free to open an issue or submit a pull request on the misp-galaxy repo.

In MISP, you can directly benefit from all the galaxies, and you also have advanced functionalities like forking and maintaining an up-to-date private version of the threat-actor database.

We are thrilled to announce two new releases for the MISP project: a significant feature and performance release, v2.5.16, and a stable maintenance release, v2.4.214.

While v2.4.214 is a focused maintenance update, v2.5.16 is packed with new tools, major performance enhancements, and a host of crucial bug fixes that will make your MISP instance faster.

#misp #threatintelligence #opensource #tip #informationsharing #threatintel #cybersecurity

misp-project.org/2025/07/19/mi

MISP Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing · MISP Releases v2.5.16 & v2.4.214 - A Major Leap in Performance and StabilityMISP Threat Intelligence & Sharing

New release: FlowIntel 1.6.0 — an open-source case management tool — now with extended support for importing MISP events as cases, a timeline view for attributes, a new templating system for notes, and many other new features!

🔗 github.com/flowintel/flowintel
🔗 github.com/flowintel/flowintel

@misp @circl

#opensource #threatintel #threatintel #dfir #cti #misp #flowintel

Thanks to @davcru for the continuous work on the project and all the new contributors.

MISP v2.4.206 and v2.5.8 introduces new workflow modules, enhanced object relationship management and significant improvements to the event synchronisation mechanism. Key highlights include improved a reworked attribute search functionality, better handling of event reports, and various security fixes. Additionally, numerous optimizations and bug fixes enhance stability and performance.

#opensource #threatintel #misp

🔗 Release notes misp-project.org/2025/03/19/MI

The MISP Project is pleased to announce the release of MISP v2.5.7 and v2.4.205, bringing several new features, important fixes, and enhancements to improve the overall user experience and platform functionality. This release addresses critical improvements in synchronization filtering, correlation management, and UI enhancements, ensuring a more stable and efficient MISP environment.

#opensource #threatintel #threatintelligence #misp

misp-project.org/2025/02/24/MI

MISP Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing · MISP v2.4.205 and v2.5.7 Released - Enhancements, Fixes, and Improved Correlation ManagementMISP Threat Intelligence & Sharing

If you're running MISP in a compartmentalized, classified, or sensitive network, controlling the flow of information is crucial. You need a simple yet independent and auditable tool to manage data exchange between MISP instances effectively.

We’re pleased to announce the release of misp-guard version 1.1, incorporating multiple improvements based on feedback from various organizations, including military and intelligence agencies.

github.com/MISP/misp-guard/rel

MISP Analyst Data Format - Enhancing STIX 2.1 Integration

The MISP Analyst Data format, part of the broader MISP-standard.org ecosystem, represents a significant step forward in structuring and exchanging cyber threat intelligence. Developed in collaboration with partners, this format builds upon the lessons learned addressing its practical shortcomings while ensuring greater efficiency, flexibility, and usability for analysts.

🔗 misp-project.org/2025/02/07/MI