We would love your help in finding other worthy feeds. Please give us your input  here.

Company Name MISP
Short Description Malware Information Sharing Platform: Free and open source
URL for more info misp-project.org
More Details

MISP is a platform for sharing, storing and correlating Indicators of Compromises of targeted attacks.

Discover how MISP is used today in multiple organisations. Not only to store, share, collaborate on malware, but also to use the IOCs to detect and prevent attacks.

- central IOC database: storing technical and non-technical information about malwares and attacks, ... Data from external instances is also imported into your local instance
- easy to use: usability is key to MISP. Free-text import, OpenIOC or configurable templates are there to releave you from the burden of encoding observables and indicators
- correlation: automatically creating relations between malwares, events and attributes
- security by design: regularly pentested, GPG encryption and signing of the mails, ...
- export: generating IDS, STIX, OpenIOC, plain text, xml output to integrate with other systems (IDS, SIEM, custom tools, ...)
- import: bulk-import, batch-import, import from OpenIOC, GFI sandbox, ThreatConnect CSV, ...
- data-sharing: automatically exchange and synchronization with other parties and trust-groups using MISP
- STIX support: export data in the STIX format (XML and json)

This quick reference was built by Crucial Point LLC as a service to the community. Intelligence on threats is key to optimizing all things cyber of course. But to really optimize you will need far greater context. Visit ThingsCyber.com for reviews of the most critical components of the Tech Landscape, insights into Cyber Threats, succinct recommendations on Protecting Your Information, reviews and pointers to the most interesting Tech Enabled Entertainment (including Sci-Fi), reviews of Books and Tech Gear, reviews of the best Tech Training, and a healthy dose of Humor.