MISP-Instanz ermöglicht IoC-Au...
Das Land Hessen geht mit einer MISP-Instanz des Hessen3C einen wichtigen Schritt für die kommunale Informationssicherheit.
🔎 Strukturierter IoC-Austausch ermöglicht ein gemeinsames Lagebild statt isolierter Reaktion.
🟢 TLP:GREEN erlaubt die direkte Nutzung im SIEM (z. B. Detektion & Anreicherung).
🤝 Kommunen werden Teil eines gemeinsamen Sicherheitsnetzwerks.
Mehrwert:
• bessere Detektion
• weniger Blindflug
• stärkere Zusammenarbeit
⚙️ Herausforderung: SIEM/TI-Betrieb ist für viele Kommunen kaum leistbar → ein landesweiter SOC-Dienst wäre ein logischer nächster Schritt.
💡 Fazit: strategischer Baustein für vernetzte Informationssicherheit.
https://hessen3c.de/meldungen-neuigkeiten/misp-instanz-ermoeglicht-ioc-austausch-mit-kommunen
24 hours until the CfP for "LAC-CSIRTs Meeting (LACNIC45 - Panama City, Panama)" closes: https://papercall.io/cfps/6188/submissions/new
#cfp #conference #Csirt #Security #Misp #Training #Dfir #Ransomware #Ddos #Community #Cybersecurity #Threat intelligence #Security awareness #Tabletop exercise #Artificial intelligence (ai) #Supply chain security #Iot security #Llm security #Vibe coding security #Lacnic45

What Is an Event in MISP?In MISP, an event is the central unit for collecting and sharing cyber threat intelligence. Think of an event as a case file - it contains IOCs (Indicators of Compromise), related context, and threat metadata.You can use events to describe: • A phishing campaign • Malware behavior • A targeted intrusion • Or any cyber incident relevant to your team or community Step 1: Creating an Event ManuallyTo create a new event:1. Log in to your goMISP instance (e.g. <instance_nam
Is there a guide how to integrate #SIEM systems and #VideoSuvailance systems vor General alarming systems for having physical and Cyber #security in one Palace (if company is not that large ...)
Or is this just a shit idea ?
Have You Ever Thought About Drones in MISP?
To better support the documentation and analysis of drone-related incidents, several new resources have been integrated into MISP.
#drone #drones #intelligence #misp #opensource #uavs #uav
🔗 https://www.misp-project.org/2026/03/10/have-you-ever-thought-about-drones-in-misp.html/
MISP Modules Update: Enhanced QR Code Support, New Validin Module, and Improved Data Enrichment - v3.0.6 released
https://github.com/MISP/misp-modules/releases/tag/v3.0.6
#misp #modules #threatintelligence #opensource #cti #threatintel #cybersecurity
+ Hörbuch
+ Gelernt
+ Mit #MISP rumgespielt
Lots of exciting work happening around the MISP project, we’ll reveal more once things are ready 👀
Meanwhile, a new MISP extension for Ghidra is under active development and steadily growing with awesome new features.
https://github.com/MISP/misp-ghidra
Switzerland Operationalizes 24-Hour Critical Infrastructure Cyber Reporting
The National Cyber Security Centre (NCSC) processed ~65,000 incident reports in 2025, including 222 under the newly mandated 24-hour reporting requirement under the ISG/CSV framework.
Operational enhancements included:
• Expanded Cyber Security Hub (1,600 members)
• 4,615 incident artifacts exchanged via MISP
• Increased bug bounty deployment across federal IT
• Open-source vulnerability testing (TYPO3, QGIS)
• CHF 18.4M total expenditure, including CHF 3.8M IT investment
This represents a mature shift toward structured national cyber governance: centralized intake, intelligence enrichment, proactive vulnerability reduction, and enforceable compliance.
From an operational standpoint, rapid disclosure requirements tighten detection cycles and strengthen cross-sector signal correlation.
Is mandatory reporting the future baseline for critical infrastructure defense?
Follow @technadu for global cyber governance and threat intelligence analysis.
#Infosec #NCSC #MISP #CyberGovernance #CriticalInfrastructure #BugBounty #OpenSourceSecurity #ThreatIntelligence