Excited to share that the MITRE Fight Fraud Framework™ (F3) is now included in the default MISP galaxy and available across all MISP instances.

F3 is a curated knowledge base of tactics and techniques used by financial fraud actors, helping analysts structure, share, and enrich fraud-related intelligence more effectively.

A great step forward for the MISP community and for teams tracking financial fraud.

🔗 https://github.com/MISP/misp-galaxy

@misp
@circl

#misp #financialfraud #threatintel #threatintelligence #opensource
#financial

@threatchain general purpose siem, malcolm ids, debian server, opnsense - good combo imo, good licensing,. I may just refactor and use 500gb drives so cost will not be the limiting factor, you can use debian blends too but even some of these specialized apps won't have included forensics-full and this has a ton of super usefull sw, when you have the persistence partition going corner case use cases can be covered better than say something like a bootable iso #rational clear case #mw #smw #yacy 3jenkins #ntop-ng #misp #cms #lamp server #sbom #addons #app armor #selinux #ufw #fail2ban #hardened debian #pentoo

What really impresses me is the creativity still thriving around the MISP project. I maintain MISP warning-lists for years to help filter false positives, and this week @iglocska built a new stand-alone #rust application for fast warning-list lookups, independent of MISP.

#rust #misp #cybersecurity #cti #threatintelligence #opensource

@misp

🔗 Source code of misp-feedback https://github.com/MISP/misp-feedback
🔗 misp-warninglists https://github.com/MISP/misp-warninglists

We are happy to announce the release of MISP v2.5.36, which includes new geolocation and map visualisation capabilities, the continued development of the Overmind UI, a new interactive CLI shell UI, important security fixes, and installer improvements.

#misp #cti #informationsharing #threatintel #opensource

https://github.com/MISP/MISP/releases/tag/v2.5.36

I'm happy to announce the long-awaited first release of misp-modules-cli version 1.0.0.

This initial release makes it nifty and convenient to use MISP expansion modules directly from the command line, whether you are working against a local or remote misp-modules service. The goal is simple: bring the power of misp-modules into a lightweight CLI workflow that is easy to script, automate, and integrate into daily analysis work.

#misp #mispmodules #threatintelligence #threatintel #opensource #cli #cybersecurity #osint

@misp

🔗 Release note https://github.com/MISP/misp-modules-cli/releases/tag/v1.0
 misp-modules-cli https://github.com/MISP/misp-modules-cli
 misp-modules https://github.com/MISP/misp-modules

Release First release of misp-modules-cli - version 1.0 · MISP/misp-modules-cli

misp-modules-cli 1.0.0 We are happy to announce the long-awaited first release of misp-modules-cli version 1.0.0. This initial release makes it nifty and convenient to use MISP expansion modules di...

GitHub
Das Hessen3C geht mit einer MISP-Instanz einen wichtigen Schritt für die kommunale Informationssicherheit. 🧵 #ITSicherheit #Kommunen #MISP #SIEM #SOC #Hessen

MISP-Instanz ermöglicht IoC-Au...
MISP-Instanz ermöglicht IoC-Austausch mit Kommunen

Hessen3C stellt Kommunen Bedrohungsinformationen, wie beispielsweise IP-Adressen, Domains oder Malware-Hashes, über eine eigene Malware Information Sharing Platform Instanz zur Verfügung.

Hessen3C CyberCompetenceCenter

Das Land Hessen geht mit einer MISP-Instanz des Hessen3C einen wichtigen Schritt für die kommunale Informationssicherheit.

🔎 Strukturierter IoC-Austausch ermöglicht ein gemeinsames Lagebild statt isolierter Reaktion.
🟢 TLP:GREEN erlaubt die direkte Nutzung im SIEM (z. B. Detektion & Anreicherung).
🤝 Kommunen werden Teil eines gemeinsamen Sicherheitsnetzwerks.

Mehrwert:
• bessere Detektion
• weniger Blindflug
• stärkere Zusammenarbeit

⚙️ Herausforderung: SIEM/TI-Betrieb ist für viele Kommunen kaum leistbar → ein landesweiter SOC-Dienst wäre ein logischer nächster Schritt.

💡 Fazit: strategischer Baustein für vernetzte Informationssicherheit.

https://hessen3c.de/meldungen-neuigkeiten/misp-instanz-ermoeglicht-ioc-austausch-mit-kommunen

#ITSicherheit #Kommunen #MISP #SIEM #SOC #Hessen

MISP-Instanz ermöglicht IoC-Austausch mit Kommunen

Hessen3C stellt Kommunen Bedrohungsinformationen, wie beispielsweise IP-Adressen, Domains oder Malware-Hashes, über eine eigene Malware Information Sharing Platform Instanz zur Verfügung.

Hessen3C CyberCompetenceCenter

24 hours until the CfP for "LAC-CSIRTs Meeting (LACNIC45 - Panama City, Panama)" closes: https://papercall.io/cfps/6188/submissions/new

#cfp #conference #Csirt #Security #Misp #Training #Dfir #Ransomware #Ddos #Community #Cybersecurity #Threat intelligence #Security awareness #Tabletop exercise #Artificial intelligence (ai) #Supply chain security #Iot security #Llm security #Vibe coding security #Lacnic45

PaperCall.io

🛡️ New to #MISP? Events are the core building blocks — grouping indicators, context, and analysis into one shareable unit. Learn how to create, structure, and tag events effectively 👇 www.gomisp.com/post/events-... #ThreatIntelligence #SOC #CyberSecurity

Events in MISP - Creating, Tag...
Events in MISP - Creating, Tagging and more...

What Is an Event in MISP?In MISP, an event is the central unit for collecting and sharing cyber threat intelligence. Think of an event as a case file - it contains IOCs (Indicators of Compromise), related context, and threat metadata.You can use events to describe: • A phishing campaign • Malware behavior • A targeted intrusion • Or any cyber incident relevant to your team or community Step 1: Creating an Event ManuallyTo create a new event:1. Log in to your goMISP instance (e.g. <instance_nam

goMISP

Is there a guide how to integrate #SIEM systems and #VideoSuvailance systems vor General alarming systems for having physical and Cyber #security in one Palace (if company is not that large ...)

Or is this just a shit idea ?

#misp #dones #cyberPhysicalConvergence