Das Hessen3C geht mit einer MISP-Instanz einen wichtigen Schritt für die kommunale Informationssicherheit. 🧵 #ITSicherheit #Kommunen #MISP #SIEM #SOC #Hessen

MISP-Instanz ermöglicht IoC-Au...
MISP-Instanz ermöglicht IoC-Austausch mit Kommunen

Hessen3C stellt Kommunen Bedrohungsinformationen, wie beispielsweise IP-Adressen, Domains oder Malware-Hashes, über eine eigene Malware Information Sharing Platform Instanz zur Verfügung.

Hessen3C CyberCompetenceCenter

Das Land Hessen geht mit einer MISP-Instanz des Hessen3C einen wichtigen Schritt für die kommunale Informationssicherheit.

🔎 Strukturierter IoC-Austausch ermöglicht ein gemeinsames Lagebild statt isolierter Reaktion.
🟢 TLP:GREEN erlaubt die direkte Nutzung im SIEM (z. B. Detektion & Anreicherung).
🤝 Kommunen werden Teil eines gemeinsamen Sicherheitsnetzwerks.

Mehrwert:
• bessere Detektion
• weniger Blindflug
• stärkere Zusammenarbeit

⚙️ Herausforderung: SIEM/TI-Betrieb ist für viele Kommunen kaum leistbar → ein landesweiter SOC-Dienst wäre ein logischer nächster Schritt.

💡 Fazit: strategischer Baustein für vernetzte Informationssicherheit.

https://hessen3c.de/meldungen-neuigkeiten/misp-instanz-ermoeglicht-ioc-austausch-mit-kommunen

#ITSicherheit #Kommunen #MISP #SIEM #SOC #Hessen

MISP-Instanz ermöglicht IoC-Austausch mit Kommunen

Hessen3C stellt Kommunen Bedrohungsinformationen, wie beispielsweise IP-Adressen, Domains oder Malware-Hashes, über eine eigene Malware Information Sharing Platform Instanz zur Verfügung.

Hessen3C CyberCompetenceCenter

24 hours until the CfP for "LAC-CSIRTs Meeting (LACNIC45 - Panama City, Panama)" closes: https://papercall.io/cfps/6188/submissions/new

#cfp #conference #Csirt #Security #Misp #Training #Dfir #Ransomware #Ddos #Community #Cybersecurity #Threat intelligence #Security awareness #Tabletop exercise #Artificial intelligence (ai) #Supply chain security #Iot security #Llm security #Vibe coding security #Lacnic45

PaperCall.io

🛡️ New to #MISP? Events are the core building blocks — grouping indicators, context, and analysis into one shareable unit. Learn how to create, structure, and tag events effectively 👇 www.gomisp.com/post/events-... #ThreatIntelligence #SOC #CyberSecurity

Events in MISP - Creating, Tag...
Events in MISP - Creating, Tagging and more...

What Is an Event in MISP?In MISP, an event is the central unit for collecting and sharing cyber threat intelligence. Think of an event as a case file - it contains IOCs (Indicators of Compromise), related context, and threat metadata.You can use events to describe: • A phishing campaign • Malware behavior • A targeted intrusion • Or any cyber incident relevant to your team or community Step 1: Creating an Event ManuallyTo create a new event:1. Log in to your goMISP instance (e.g. <instance_nam

goMISP

Is there a guide how to integrate #SIEM systems and #VideoSuvailance systems vor General alarming systems for having physical and Cyber #security in one Palace (if company is not that large ...)

Or is this just a shit idea ?

#misp #dones #cyberPhysicalConvergence

Have You Ever Thought About Drones in MISP?

To better support the documentation and analysis of drone-related incidents, several new resources have been integrated into MISP.

#drone #drones #intelligence #misp #opensource #uavs #uav

@misp

🔗 https://www.misp-project.org/2026/03/10/have-you-ever-thought-about-drones-in-misp.html/

MISP Modules Update: Enhanced QR Code Support, New Validin Module, and Improved Data Enrichment - v3.0.6 released

https://github.com/MISP/misp-modules/releases/tag/v3.0.6

#misp #modules #threatintelligence #opensource #cti #threatintel #cybersecurity

#ThreeGoodThings #3GoodThings

+ Hörbuch
+ Gelernt
+ Mit #MISP rumgespielt

Lots of exciting work happening around the MISP project, we’ll reveal more once things are ready 👀

Meanwhile, a new MISP extension for Ghidra is under active development and steadily growing with awesome new features.

https://github.com/MISP/misp-ghidra

#ghidra #misp #cybersecurity #threatintel #reversing

@misp
@circl

GitHub - MISP/misp-ghidra: Ghidra and MISP

Ghidra and MISP. Contribute to MISP/misp-ghidra development by creating an account on GitHub.

GitHub

Switzerland Operationalizes 24-Hour Critical Infrastructure Cyber Reporting

The National Cyber Security Centre (NCSC) processed ~65,000 incident reports in 2025, including 222 under the newly mandated 24-hour reporting requirement under the ISG/CSV framework.

Operational enhancements included:
• Expanded Cyber Security Hub (1,600 members)
• 4,615 incident artifacts exchanged via MISP
• Increased bug bounty deployment across federal IT
• Open-source vulnerability testing (TYPO3, QGIS)
• CHF 18.4M total expenditure, including CHF 3.8M IT investment
This represents a mature shift toward structured national cyber governance: centralized intake, intelligence enrichment, proactive vulnerability reduction, and enforceable compliance.

From an operational standpoint, rapid disclosure requirements tighten detection cycles and strengthen cross-sector signal correlation.

Is mandatory reporting the future baseline for critical infrastructure defense?

Source: https://industrialcyber.co/reports/switzerlands-ncsc-boosts-operational-capabilities-mandates-cyberattack-reporting-on-critical-infrastructure/

Follow @technadu for global cyber governance and threat intelligence analysis.

#Infosec #NCSC #MISP #CyberGovernance #CriticalInfrastructure #BugBounty #OpenSourceSecurity #ThreatIntelligence