MISP 2.4.189 released with bug fixes, performance improvements and a new blocklist feature.
We are pleased to announce the immediate release of MISP 2.4.189, released with bug fixes, performance improvements and a new blocklist feature.
We are pleased to announce the immediate release of MISP 2.4.189, released with bug fixes, performance improvements and a new blocklist feature.
This lab explains how to connect MISP to the Elastic Stack in order to leverage IOCs from MISP and trigger alerts based on user defined rules.
We are pleased to announce the immediate release of MISP 2.4.188, with major performance improvements and many bugs fixed.
ignoreIndexHint parameter (mysqlExtended, mysqlObserverExtended).forceIndexHint.restsearch and /events/view endpoints). This helps with performance issues caused by large sighting data sets.BadRequestException as fail log in CI.misp-galaxy, misp-object, and warning-lists.analyst-data and event-reports.sightings:getLastSighting.includeDecayScore by a factor of 5.unpublishedprivate directive.CURLOPT_NOBODY for HEAD requests.redisReady in dragonfly.Exception to Throwable in ECS.MISP.email_reply_to to server config.misp-stix, attachment scan error handling, OIDC default org handling, alert email titles, shadow attribute handling, and community additions (ICS-CSIRT.io).Details changes are available in Changelog.
We are pleased to announce the immediate release of MISP 2.4.187, including security fixes, new features and bugs fixes.
org list to shell commands.OidcAuth.update_user_role to disable role changes from OIDC.ext-zstd to suggested PHP extensions.removeTagFromObject().Details changes are available in Changelog.
In the ever-evolving landscape of information security, the need for adaptable and efficient tools has never been greater. The MISP project, known for facilitating the sharing of structured threat information, has taken a significant leap forward. We’re excited to announce a pivotal enhancement to the misp-modules, a collection of modules for MISP, extending their functionality to operate not only as an integral part of MISP but also as a standalone web application.
We are pleased to announce the immediate release of MISP 2.4.186, which includes two major new feature called “Analyst Data” and “Collections” along with an extension to the MISP standard format.
We are happy to announce the immediate availability of MISP 2.4.185. This is mainly a bug fix release resolving several issues as well as tightening the security posture of the org image handling.
MISP 2.4.184 released with performance improvements, security and bugs fixes.
MISP.disable_cached_exports enabled by default. Since the /events/export has been marked deprecated for a years, we are starting the process to phase it out by first disabling the endpoint by default. The MISP ReST search API is the API to be used in the future if you still have very old scripts relying on export. We recommend to start making plans to rework those scripts.A series of security fixes were done in this release, the vulnerabilities are accessible to authenticated users, especially those with specific privileges like Org admin. We urge users to update to this version especially if you have different organisations having access to your instances.
MISP 2.4.183 released with a new ECS log feature, improvements and bugs fixed.
Security.ecs_log to enable this new functionality. A new Security.alert_on_suspicious_logins to security audit has been added.Many bugs fixed and minor improvements. Feel free to read the detailed changelog
MISP 2.4.182 released with new features, improvements bugs fixed and an important security fix.
show_server_correlations_for_all_users
allowing non-privileged users to view server correlations. [Sami
Mokaddem][Version] bump. [iglocska]
MISP 2.4.180 released with a new security user login profile feature, bugs fixed and many improvements.
Merge remote-tracking branch ‘origin/develop’ into 2.4. [Christophe Vandeplas]
MISP 2.4.179 released with a host of improvements a security fix and some new tooling.
We currently included our first attempt at an LLM integration for report summarisation and extraction. The development is an outcome of our work with @aaronkaplan during hack.lu 2024 and relies on stochasticCTIExtractor for the extraction and interfacing with LLMs.
MISP 2.4.178 released with many workflow improvements, enhancement and bugs fixed.
totp_delete added in query builder and API documentation.orgc_id as valid filter.includeGranularCorrelations is now exposed in the event RestSearch.cryptocurrency-transaction and many updates to other objects. For detailed changes, MISP objects changelog.ammunition, firearms and many updates in threat actor, Sigma and many other. For detailed changes, MISP galaxy changelogThe MISP projet has its own Mastodon server misp-community.org - don’t forget to follow @misp@misp-community.org on the fediverse. Core contributors of MISP can sign-up if they wish to have an account.
MISP 2.4.177 released with various bugs fixed and improvements.
[tests] testing disabling the timestamp greater as old timestamp for password changes.
MISP 2.4.176 released with various improvements and bugs fixed. This version also includes major improvements in the misp-stix library especially on the storing relationships and the description of relationships in the MISP standard format.
The MISP to Microsoft Sentinel integration allows you to upload indicators from MISP to Microsoft Sentinel. It relies on PyMISP to get indicators from MISP and an Azure App to connect to Sentinel.
MISP 2.4.175 released with various bugs fixed, improvements and security fixes.
start_date and end_date options in the MISP dashboard widgets.first_half_year and second_half_year timeframe.push_rules from being required in API requests to the /server/edit endpoint.Event key.Thanks to BeDisruptive OSS Team and Centre for Cyber Security Belgium (CCB) for the reporting.
As one of the outcomes of GeekWeek8, MISP now supports a new set of features useful for handling radio frequency information in the Signal Metadata Format Specification) (SigMF), commonly used in Software Defined Radio (SDR), digital signal processing and data analysis applications.
The MISP to Azure / Sentinel integration allows you to upload indicators from MISP to Microsoft Sentinel. It relies on PyMISP to get indicators from MISP and an Azure App and Threat Intelligence Data Connector in Azure.
© MISP project. Software released under approved open source licenses and content of this website released as CC BY-SA 3.0.
Template by Bootstrapious. Ported to Hugo by DevCows.