Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Could I please request some advice from my fellow cybersecurity people.

Could I please request some advice from my fellow cybersecurity people.

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
11 Posts 5 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • nopatience@swecyb.comN This user is from outside of this forum
    nopatience@swecyb.comN This user is from outside of this forum
    nopatience@swecyb.com
    wrote last edited by
    #1

    Could I please request some advice from my fellow cybersecurity people. I'm thinking of putting together a public feed of IOCs from public OSINT-reporting.

    I've already got everything setup, but I'm not sure if this would be considered... a little bit too much of a scraping activity.

    Would it be appreciated, or frowned upon?

    #Cybersecurity #ThreatIntel

    cali@infosec.exchangeC claushoumann@mastodon.socialC bongoknight@ioc.exchangeB deepthoughts10@infosec.exchangeD 4 Replies Last reply
    0
    • nopatience@swecyb.comN nopatience@swecyb.com

      Could I please request some advice from my fellow cybersecurity people. I'm thinking of putting together a public feed of IOCs from public OSINT-reporting.

      I've already got everything setup, but I'm not sure if this would be considered... a little bit too much of a scraping activity.

      Would it be appreciated, or frowned upon?

      #Cybersecurity #ThreatIntel

      cali@infosec.exchangeC This user is from outside of this forum
      cali@infosec.exchangeC This user is from outside of this forum
      cali@infosec.exchange
      wrote last edited by
      #2

      @nopatience appreciated.. what are the sources?

      nopatience@swecyb.comN 2 Replies Last reply
      0
      • cali@infosec.exchangeC cali@infosec.exchange

        @nopatience appreciated.. what are the sources?

        nopatience@swecyb.comN This user is from outside of this forum
        nopatience@swecyb.comN This user is from outside of this forum
        nopatience@swecyb.com
        wrote last edited by
        #3

        @Cali Sources are "primary", i.e. articles/blogposts by companies like Mandiant, CrowdStrike, CloudSek, Huntress, etc etc.

        There are 351 such sources that I'm pulling from.

        I'm not entirely sure about the format either. Because I'm guessing that some would probably prefer to get it machine readable, but others may want to know from where a specific IOC came from.

        Ideally it should probably be provided in some sort of TAXII/STIX feed thingy.

        But I also don't want to make it too complicated. A continuously updated CSV might be alright... or just a JSON populated with new entries.

        1 Reply Last reply
        0
        • nopatience@swecyb.comN nopatience@swecyb.com

          Could I please request some advice from my fellow cybersecurity people. I'm thinking of putting together a public feed of IOCs from public OSINT-reporting.

          I've already got everything setup, but I'm not sure if this would be considered... a little bit too much of a scraping activity.

          Would it be appreciated, or frowned upon?

          #Cybersecurity #ThreatIntel

          claushoumann@mastodon.socialC This user is from outside of this forum
          claushoumann@mastodon.socialC This user is from outside of this forum
          claushoumann@mastodon.social
          wrote last edited by
          #4

          @nopatience to me the question is 'how would anyone consume and action it'. Always my first question when someone wants to do CTI :).

          nopatience@swecyb.comN 1 Reply Last reply
          0
          • cali@infosec.exchangeC cali@infosec.exchange

            @nopatience appreciated.. what are the sources?

            nopatience@swecyb.comN This user is from outside of this forum
            nopatience@swecyb.comN This user is from outside of this forum
            nopatience@swecyb.com
            wrote last edited by
            #5

            @Cali I'm also thinking of possibly not just providing a list of IOCs, but rather a contextually rich list with a bit more information about the IOC in question.

            1 Reply Last reply
            0
            • claushoumann@mastodon.socialC claushoumann@mastodon.social

              @nopatience to me the question is 'how would anyone consume and action it'. Always my first question when someone wants to do CTI :).

              nopatience@swecyb.comN This user is from outside of this forum
              nopatience@swecyb.comN This user is from outside of this forum
              nopatience@swecyb.com
              wrote last edited by
              #6

              @claushoumann 100% which is also why I'm thinking of not just another list of "random" IOCs.

              I have all this data and I would like to make it available somehow, but usefully so ... (assuming people are generally OK with it!)

              I'm really quite open for suggestions here.

              Kinda liking the idea of JSON data, and perhaps it should be structured according to STIX because it would be generally quite easy to consume and ingest.

              claushoumann@mastodon.socialC 1 Reply Last reply
              0
              • nopatience@swecyb.comN nopatience@swecyb.com

                Could I please request some advice from my fellow cybersecurity people. I'm thinking of putting together a public feed of IOCs from public OSINT-reporting.

                I've already got everything setup, but I'm not sure if this would be considered... a little bit too much of a scraping activity.

                Would it be appreciated, or frowned upon?

                #Cybersecurity #ThreatIntel

                bongoknight@ioc.exchangeB This user is from outside of this forum
                bongoknight@ioc.exchangeB This user is from outside of this forum
                bongoknight@ioc.exchange
                wrote last edited by
                #7

                @nopatience I think it could please some people! It would be something similar to Rosti and their IoCs list?

                https://rosti.bin.re/
                https://rosti.bin.re/iocs

                1 Reply Last reply
                0
                • nopatience@swecyb.comN nopatience@swecyb.com

                  @claushoumann 100% which is also why I'm thinking of not just another list of "random" IOCs.

                  I have all this data and I would like to make it available somehow, but usefully so ... (assuming people are generally OK with it!)

                  I'm really quite open for suggestions here.

                  Kinda liking the idea of JSON data, and perhaps it should be structured according to STIX because it would be generally quite easy to consume and ingest.

                  claushoumann@mastodon.socialC This user is from outside of this forum
                  claushoumann@mastodon.socialC This user is from outside of this forum
                  claushoumann@mastodon.social
                  wrote last edited by
                  #8

                  @nopatience I am thinking that if OpenTide could add an “expire by” or “review by”, then you could release in OpenTide format and just push all to MISP and let those who want ingest from there. OpenTide pickup by the community isn’t huge yet, but every little ecosystem addition helps.

                  nopatience@swecyb.comN 1 Reply Last reply
                  0
                  • claushoumann@mastodon.socialC claushoumann@mastodon.social

                    @nopatience I am thinking that if OpenTide could add an “expire by” or “review by”, then you could release in OpenTide format and just push all to MISP and let those who want ingest from there. OpenTide pickup by the community isn’t huge yet, but every little ecosystem addition helps.

                    nopatience@swecyb.comN This user is from outside of this forum
                    nopatience@swecyb.comN This user is from outside of this forum
                    nopatience@swecyb.com
                    wrote last edited by
                    #9

                    @claushoumann I feel uneducated about OpenTide. Any suggestions for how to get up-to-speed?

                    claushoumann@mastodon.socialC 1 Reply Last reply
                    0
                    • nopatience@swecyb.comN nopatience@swecyb.com

                      @claushoumann I feel uneducated about OpenTide. Any suggestions for how to get up-to-speed?

                      claushoumann@mastodon.socialC This user is from outside of this forum
                      claushoumann@mastodon.socialC This user is from outside of this forum
                      claushoumann@mastodon.social
                      wrote last edited by
                      #10

                      @nopatience The white paper on opentidehq on github is worth a read :). If not, ping me for a demo sometime.

                      1 Reply Last reply
                      0
                      • nopatience@swecyb.comN nopatience@swecyb.com

                        Could I please request some advice from my fellow cybersecurity people. I'm thinking of putting together a public feed of IOCs from public OSINT-reporting.

                        I've already got everything setup, but I'm not sure if this would be considered... a little bit too much of a scraping activity.

                        Would it be appreciated, or frowned upon?

                        #Cybersecurity #ThreatIntel

                        deepthoughts10@infosec.exchangeD This user is from outside of this forum
                        deepthoughts10@infosec.exchangeD This user is from outside of this forum
                        deepthoughts10@infosec.exchange
                        wrote last edited by
                        #11

                        @nopatience have you seen this? Seems similar. https://www.sentinelone.com/labs/from-narrative-to-knowledge-graph-llm-driven-information-extraction-in-cyber-threat-intelligence/

                        1 Reply Last reply
                        1
                        0
                        • R relay@relay.infosec.exchange shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups