RectifyqUsing MISP as a platform for CTF WriteupsI have always love MISP and and I kinda like CTF now, what if I use MISP to systematically store the CTF challenges data and attachments?Sep 20
Adonay T.IntroductionThis blog entry details how we can automate Wazuh to take advantage of the MISP API. This automation serves as a great benefit because our…Jan 236
RectifyqHow to send Email from MISP using GmailHave been using Malware Information Sharing Platform (MISP) quite a while, but never configured everything properly, as I’m only using it…Sep 7Sep 7
jcm3MISP | TryHackMe — WalkthroughHey all, this is the eleventh installment in my walkthrough series on TryHackMe’s SOC Level 1 path and the fifth and final room in this…Feb 18Feb 18
SchesmuTwoBuild Your Own Lab SOC: A Step-by-Step Guide to Creating a SOC from Scratch — Part 3introductionAug 221Aug 221
RectifyqUsing MISP as a platform for CTF WriteupsI have always love MISP and and I kinda like CTF now, what if I use MISP to systematically store the CTF challenges data and attachments?Sep 20
Adonay T.IntroductionThis blog entry details how we can automate Wazuh to take advantage of the MISP API. This automation serves as a great benefit because our…Jan 236
RectifyqHow to send Email from MISP using GmailHave been using Malware Information Sharing Platform (MISP) quite a while, but never configured everything properly, as I’m only using it…Sep 7
jcm3MISP | TryHackMe — WalkthroughHey all, this is the eleventh installment in my walkthrough series on TryHackMe’s SOC Level 1 path and the fifth and final room in this…Feb 18
SchesmuTwoBuild Your Own Lab SOC: A Step-by-Step Guide to Creating a SOC from Scratch — Part 3introductionAug 221
Andrew BloomaninOSINT TeamBuild Your Own Cyber Threat Intel Feeds at Home! (MISP)Learn how to Collect Open Source Threat IntelligenceAug 143
Chris Martin (@thatsiemguy)MISP, BindPlane, and Google SecOpsExploring the default MISP IOC integration for Google SecOps using PyMISP and ObservIQ BindPlane.Jun 29
Hasitha UpekshithaSimplifying Security Operations: Installing Wazuh, The Hive, Cortex, and MISP Using DockerIn the ever-evolving landscape of cybersecurity, deploying an integrated set of tools is crucial for effective threat detection, analysis…Feb 263