toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

234
active users

#misp

0 posts0 participants0 posts today

We are thrilled to announce two new releases for the MISP project: a significant feature and performance release, v2.5.16, and a stable maintenance release, v2.4.214.

While v2.4.214 is a focused maintenance update, v2.5.16 is packed with new tools, major performance enhancements, and a host of crucial bug fixes that will make your MISP instance faster.

#misp #threatintelligence #opensource #tip #informationsharing #threatintel #cybersecurity

misp-project.org/2025/07/19/mi

MISP Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing · MISP Releases v2.5.16 & v2.4.214 - A Major Leap in Performance and StabilityMISP Threat Intelligence & Sharing

New release: FlowIntel 1.6.0 — an open-source case management tool — now with extended support for importing MISP events as cases, a timeline view for attributes, a new templating system for notes, and many other new features!

🔗 github.com/flowintel/flowintel
🔗 github.com/flowintel/flowintel

@misp @circl

#opensource #threatintel #threatintel #dfir #cti #misp #flowintel

Thanks to @davcru for the continuous work on the project and all the new contributors.

MISP v2.4.206 and v2.5.8 introduces new workflow modules, enhanced object relationship management and significant improvements to the event synchronisation mechanism. Key highlights include improved a reworked attribute search functionality, better handling of event reports, and various security fixes. Additionally, numerous optimizations and bug fixes enhance stability and performance.

#opensource #threatintel #misp

🔗 Release notes misp-project.org/2025/03/19/MI

The MISP Project is pleased to announce the release of MISP v2.5.7 and v2.4.205, bringing several new features, important fixes, and enhancements to improve the overall user experience and platform functionality. This release addresses critical improvements in synchronization filtering, correlation management, and UI enhancements, ensuring a more stable and efficient MISP environment.

#opensource #threatintel #threatintelligence #misp

misp-project.org/2025/02/24/MI

MISP Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing · MISP v2.4.205 and v2.5.7 Released - Enhancements, Fixes, and Improved Correlation ManagementMISP Threat Intelligence & Sharing

If you're running MISP in a compartmentalized, classified, or sensitive network, controlling the flow of information is crucial. You need a simple yet independent and auditable tool to manage data exchange between MISP instances effectively.

We’re pleased to announce the release of misp-guard version 1.1, incorporating multiple improvements based on feedback from various organizations, including military and intelligence agencies.

github.com/MISP/misp-guard/rel

GitHubRelease v1.1 · MISP/misp-guardWhat's Changed add: extend coverage, fix analyst data inspection by @righel in #17 add more logging change logging defaults live-reload config if config file was changed, log config settings on lo...

MISP Analyst Data Format - Enhancing STIX 2.1 Integration

The MISP Analyst Data format, part of the broader MISP-standard.org ecosystem, represents a significant step forward in structuring and exchanging cyber threat intelligence. Developed in collaboration with partners, this format builds upon the lessons learned addressing its practical shortcomings while ensuring greater efficiency, flexibility, and usability for analysts.

🔗 misp-project.org/2025/02/07/MI

Taking some inspiration from Bushidotoken's latest blog and finally getting a MISP instance configured.

I used OpenCTI in the past but it felt like too much overhead along with a lot of "this feature is for Enterprise users."

#MISP #threatintel

blog.bushidotoken.net/2025/01/

blog.bushidotoken.netTracking Adversaries: Ghostwriter APT InfrastructureCTI, threat intelligence, OSINT, malware, APT, threat hunting, threat analysis, CTF, cybersecurity, security

The MISP-standard.org is proud to announce the release of a new standard: Threat Actor Naming (RFC). This standard addresses one of the most critical challenges in cybersecurity information sharing—the consistent and reliable identification of threat actors.

#standard #openstandard #cybersecurity #misp #threatintelligence #threatintel

🔗 misp-standard.org/blog/Naming-

MISP Standard · MISP-standard.org - Introducing the MISP Threat Actor Naming StandardHow to name threat actor and adversaries in threat intelligence

AIL 6.0 and MISP-LEA: Empowering LEAs with Direct Access to a Data Lake of Dark Web and Cybercriminal Information.

We are thrilled to announce the integration of the latest AIL 6.0 release into the MISP-LEA ecosystem, enabling Law Enforcement Agencies (LEAs) to request and gain direct access to a comprehensive data lake containing dark web crawled information...

🔗 misp-lea.org/news/2024/12/11/L

#darkweb #cybersecurity #opensource #lea #osint #misp

@misp @ail_project