What is MISP and How it is Used For Cyber Threat Intelligence?

แชร์
ฝัง

ความคิดเห็น • 13

  • @ahmedkhormi8906
    @ahmedkhormi8906 3 หลายเดือนก่อน +1

    Thanks Adam for the valuabe information

  • @asassdsdd
    @asassdsdd 3 หลายเดือนก่อน +1

    Hey, Adam. I just saw your latest video. This is great content!

  • @w0ode198
    @w0ode198 4 หลายเดือนก่อน +1

    HI Adam.
    I first seen you on Medium with your articles in which I always thought they were fully written out and very verbose about MISP. I am really happy to see these videos here on TH-cam. I am more than happy to subscribe. Thank you for your efforts and keep them coming. Much appreciated

    • @adamgoss-kraven
      @adamgoss-kraven  4 หลายเดือนก่อน +2

      Thanks and thanks for the sub! Hoping to get more uploaded soon.

  • @vasundhragupta108
    @vasundhragupta108 2 หลายเดือนก่อน +1

    Indeed informative!! Thank You Adam :). Request to make such videos for other OSINT sources/platforms as well.

    • @adamgoss-kraven
      @adamgoss-kraven  2 หลายเดือนก่อน +1

      @@vasundhragupta108 thanks! Are there any platforms you’d like to see covered in particular?

    • @vasundhragupta108
      @vasundhragupta108 2 หลายเดือนก่อน

      @@adamgoss-kraven Dear Adam,
      The great thing about your videos is that in just 10-15 minutes, you can elevate a beginner to a cybersecurity pro. You also take a tool and cover it from every angle (via your Platform Series). Remember, for learners, scenario-based learning-showing how the tool is used in various cases-is the most important. Theory is already available on Google and through AI. Sometimes people struggle with the basic installations/concepts, but you have covered those in your videos.
      For platforms, it would be awesome to see full coverage on tools like:
      1. SpiderFoot: For reconnaissance and gathering initial data about potential threats using automated scanning and OSINT techniques.
      2. The Harvester: To collect email addresses, subdomains, and other relevant information to profile targets.
      3. Recon-ng: A powerful framework for web reconnaissance, allowing detailed data collection and analysis.
      4. Yeti: To manage threat intelligence, helping researchers to store and analyze data effectively.
      5. OpenCTI: To visualize and correlate threat data, facilitating collaboration and operational insights.
      6. TheHive: For incident response and case management, allowing researchers to respond to confirmed threats efficiently.
      7. Sigma: To create and share detection rules that can be translated into queries for various SIEMs, enhancing threat detection capabilities.
      Thanks! All the best :)

    • @vasundhragupta108
      @vasundhragupta108 2 หลายเดือนก่อน

      @@adamgoss-kraven Dear Adam, The great thing about your videos is that in just 10-15 minutes, you can elevate a beginner to a cybersecurity pro. You also take a tool and cover it from every angle, which is incredibly helpful. For learners, scenario-based learning-demonstrating how tools are used in various cases-is essential, especially since many people struggle with basic concepts and installations. Your videos have made this easier for so many.
      It would be awesome to see full coverage on tools like:
      MISP - Malware Information Sharing Platform: A tool for sharing structured threat information to improve detection and response capabilities.
      TheHive - A scalable, open-source Security Incident Response Platform that helps security teams manage incidents and analyze threat data.
      OpenCTI - A platform to manage Cyber Threat Intelligence in a structured way, providing comprehensive coverage and context.
      Yeti - A threat intelligence framework that helps users gather and analyze threat data while facilitating collaboration.
      SpiderFoot - An OSINT automation tool that helps gather data on IPs, domains, and other entities for threat reconnaissance.
      Harvester - A tool for gathering emails, subdomains, hosts, employee names, and other information from public sources.
      Recon-ng - A full-featured web reconnaissance framework that allows users to conduct open-source web-based reconnaissance.
      Cuckoo Sandbox - An automated malware analysis system that helps in analyzing suspicious files and observing their behavior in a safe environment.
      Sigma - A generic signature format for SIEM systems, helping to create a wide range of detection rules based on various log sources.
      Thanks! All the best :)

    • @vasundhragupta108
      @vasundhragupta108 2 หลายเดือนก่อน

      ​@@adamgoss-kraven Dear Adam, Your videos do an incredible job of elevating beginners to cybersecurity pros in just 10-15 minutes! I appreciate how you cover each tool from every angle. Scenario-based learning is vital, especially for those struggling with basic concepts and installations.
      It would be great to see coverage on tools like:
      MISP - Malware Information Sharing Platform
      TheHive - Security Incident Response Platform
      OpenCTI - Cyber Threat Intelligence management
      Yeti - Threat intelligence framework
      SpiderFoot - OSINT automation tool
      Harvester - Public information gathering tool
      Recon-ng - Web reconnaissance framework
      Cuckoo Sandbox - Automated malware analysis system
      Sigma - SIEM signature format
      These tools provide valuable threat intelligence and analysis capabilities!
      Thanks and Regards :)

    • @vasundhragupta108
      @vasundhragupta108 2 หลายเดือนก่อน

      ​@@adamgoss-kraven Dear Adam, I like how your videos elevate beginners to cybersecurity pros in just 10-15 minutes! Your in-depth coverage of each tool is invaluable. Scenario-based learning is key, especially for those struggling with basic concepts and installations.
      I'd love to see coverage on the following tools:
      MISP: Malware Information Sharing Platform
      TheHive: Security Incident Response Platform
      OpenCTI: Cyber Threat Intelligence management
      Yeti: Threat intelligence framework
      SpiderFoot: OSINT automation tool
      Harvester: Public information gathering tool
      Recon-ng: Web reconnaissance framework
      Cuckoo Sandbox: Automated malware analysis
      Sigma: SIEM signature format
      These platforms could really enhance our understanding of threat intelligence! :)