10 Followers
6 Following
6 Posts
Cosive works with leading organisations Australasia-wide to improve their security posture. We are experts in the use of threat intelligence and security orchestration.
Websitehttps://www.cosive.com
Twitterhttps://twitter.com/cosiveco
YouTubehttps://www.youtube.com/@cosive
Bloghttps://www.cosive.com/blog
Podcasthttps://www.cosive.com/podcast
LinkedInhttps://www.linkedin.com/company/cosive

Introducing Episode 4 of the Cosive #Podcast! 🎉🎙

How #ChatGPT Could Transform the CTI Analyst Role, with Chris Horsley

Just 15 minutes - and well worth a listen 👇

https://www.cosive.com/podcast/2022/12/21/episode-004-how-chatgpt-could-transform-the-cti-analyst-role-with-chris-horsley

#ThreatIntel #ThreatIntelligence #CyberSecurity #CyberSecurityTips

Episode #004: How ChatGPT Could Transform the CTI Analyst Role with Chris Horsley — Cosive

Cosive CTO Chris Horsley conducted early experiments using ChatGPT to help assign ATT&CK IDs to threat intelligence reports. While the tool won’t replace an experienced analyst as of today, it will likely change the way we do this kind of work.

Cosive

🌴 What did you do last weekend? Our CTO decided to see what he could do with #ChatGPT, an #OSINT report and #ATTACK and followed up with a blog post "ATT&CKing with OpenAI’s ChatGPT". Are you using #OpenAI in #CyberSecurity?

#threatintel, #threatintelligence, #misp, #CloudMISP

👩 ‍🏫 Some training went into the process, for example ChatGPT didn't think it could process or analyse #CTI reports, but with some grooming and careful wording, Chris got the bot the extract and analyse and suggest the most appropriate techniques.

🗣️ He said: "This reminded me of discussing ideas with analyst colleagues on the most appropriate way to classify or describe something. You certainly wouldn’t trust ChatGPT to just make technique ID assignments and then publish it to the world - you’d have another analyst in the loop."

📖 You can read the full blog post here - https://www.cosive.com/blog/2022/12/5/mitre-attacking-with-openais-chatgpt

ATT&CKing with OpenAI’s ChatGPT — Cosive

We try out some exciting early experiments using ChatGPT for helping us assign ATT&CK IDs to threat intelligence reports. While it’s not going to replace an experienced analyst as of today, it will likely change the way we do this kind of work.

Cosive

💡 Want to know @cosive's idea of the 7 best practices for #MISP? Our CTO Chris Horsley writes about it in our latest blog "7 MISP Best Practices: Lessons from Effective Threat Intel Teams"

TL;DR in this thread 👇

#MISP #CloudMISP #ThreatIntel #threatintelligence

1. Carefully upgrade MISP to the latest release as soon as possible: MISP has a very high throughput of releases, about 12 - 15 per year. As with any piece of software, those updates could be security releases.

⚠️ BUT upgrading MISP isn’t always as simple as pressing a button. For all their benefits, upgrades can introduce new behaviour and changes that may impact existing workflows. Upgrade in a non production environment and test first before deploying.

2. Implement robust monitoring and maintenance: MISP needs things like logging, disaster recovery, perhaps even high availability.

🚧 The best threat intel teams run MISP like they’d run any important production system: on a scaffold of monitoring and regular maintenance.

3. Avoid the volume trap by focusing on high-quality data: It’s easy to think that a higher volume of threat intel equals more visibility over threats.

🧠 But a lot of that threat intelligence may be poor quality in terms of detection.

4. Remember that the tools ultimately exist to serve analysts: A lot of organisations are putting money into tooling. Being able to house, process, and automate a lot of this data processing is important.

🤓 But it has to be done in the service of analysts.

5. Have a clear triage process for your analysts: Some MISP workflows can be fully automated. For others, you need to have an analyst in the loop.

🫣 Having a clear triage process can help you decide what can be totally automated, and what requires analyst oversight.

6. Define your threat intel products: Threat intel products are use cases for threat intel within your organisation that produce a beneficial business outcome.

🤯 Using threat intel to inform strategic decisions is another potential threat intel product.

⚠️ For threat intel to be useful to the SOC, the executives, and other consumers of the information, you need to understand what they do on their side of the fence to make the organisation safer.

7. Automate as much as possible with machine-to-machine feeds: Threat intel about how a hack happened six months ago has some value, but far less value than if we can get the defences in place within a day or two.

🔚 Final Words: In many ways, the quality and usefulness of a tool is defined by the effort put into maintaining it.

If your team needs help to keep MISP running reliably, check out #CloudMISP, our managed MISP offering.

🎉 You can read the full blog post on our website: https://cosive.com/blog/2022/12/13/7-misp-best-practices-lessons-from-effective-threat-intel-teams

If you have any other best practices you'd like to share, please drop us a comment 👇

7 MISP Best Practices: Lessons from Effective Threat Intel Teams — Cosive

Getting a barebones MISP instance up and running is well within the skill-set of most SOC teams. Download MISP, run it on a VM, and log in to the MISP admin console using default credentials… all within about 10 minutes. That part is easy. Now for the hard part: how do you get from a barebones MISP

Cosive