Threat Intelligence with MISP: Part 5 – Searching and Filtering

Learn how to search and filter MISP events and attributes to find threat intelligence relevant to you.
We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.
Learn how to search and filter MISP events and attributes to find threat intelligence relevant to you.
Learn how to add open-source threat intelligence feeds to your MISP instance so you can begin rapidly populating the threat intelligence platform with the latest data.
Learn how to start using MISP. You will learn about MISP events, how to create them, and how to add context to them using MISP's galaxies and taxonomies
Let’s take a look at Visual Threat Intelligence by Thomas Roccia and discover why it is so popular in the cyber security community in this complete review.
Learn how to install and set up MISP. You will discover the various installation methods available, which is best, and how to configure your MISP instance to begin ingesting threat intelligence.
Discover the premier open-source threat intelligence sharing platform, its key features, and how you can use it to elevate your security posture!
Being a cyber threat intelligence analyst is a difficult job. Here are the top 5 mistakes I made when I first started that you can learn from and avoid.
Begin understanding how attackers think by performing threat profiling to map out how they might attack your organization using the MITRE ATT&CK matrix.
Discover how the cyber world is shifting to a new era of employment with the emergence of the gig economy so you can take advantage of it and stay relevant.
Learn the key components of incident response playbooks, how to create your own, and the best implementation practices to get them enterprise ready.
Discover what a typical workday looks like for a senior cyber threat intelligence analyst, the daily tasks I perform, and what you can expect in this role.
Learn 5 ways to use AI and ChatGPT to create custom tools that you can use in your day-to-day work to improve your organization’s cyber security posture.
Discover what Jupyter Notebooks are and learn how to create your own to structure your threat hunting workflow and improve your efficiency.
Learn 7 of the best cyber security notetaking applications you can use to capture your thoughts, document what needs to be done, and create a knowledge base.
Learn to create your own Python packages using the Python module Poetry. This lets you easily share your threat hunting tools with the community.