Skip to content

Threat Intelligence

  • Alerts
  • Downloads
  • Links
  • IOC Feeds
SIEM Log Ingestion – To filter or to deduplicate
logstash sentinel siem

SIEM Log Ingestion – To filter or to deduplicate

threatinfoApril 24, 2024April 24, 2024

Why Should You Manage Your Log Ingestion? Cost Implications SIEM tools operate under a licensing model that typically charges based…

Sentinel Parsing Data at Ingestion or at Query time
sentinel siem

Sentinel Parsing Data at Ingestion or at Query time

threatinfoApril 1, 2024December 10, 2024

There are different options for parsing data in Microsoft Sentinel.  Query time parsing when the parsing is done when an…

Why is the Sentinel Threat Intelligence Indicator API so full of bugs
sentinel siem Threat Intelligence

Why is the Sentinel Threat Intelligence Indicator API so full of bugs

threatinfoMarch 14, 2024December 17, 2024

Microsoft have an API to add IOCs to the threat intelligence module in sentinel which can you read about here.…

Threat Intelligence

MISP Database Size Getting Too Large

threatinfoMarch 11, 2024April 11, 2024

MISP MYSQL database growing too large and starting to get out of control?  API calls getting slower and slower?  Maybe…

MISP – An Internal Error has occured – HTTP Status code 500
Threat Intelligence

MISP – An Internal Error has occured – HTTP Status code 500

threatinfoMarch 7, 2024

If you receive a “An internal error has occured” error message when clicking on various menu functions in the MISP…

Whats a threat activity cluster?
Threat Intelligence

Whats a threat activity cluster?

threatinfoFebruary 25, 2024December 24, 2024

A threat activity cluster is a grouping of security alerts which are related to a unique or similar activity taking place in…

Filebeat write: failed to publish events / connection reset by peer
filebeat logstash sentinel

Filebeat write: failed to publish events / connection reset by peer

threatinfoJanuary 18, 2024January 18, 2024

I was using filebeat to listen on port 514 to accept rsyslog messages from AIX servers with the aim of…

WSO Shell used in a Phishing-as-a-Service (PhaaS) 365 harvesting phishing campaign
Threat Intelligence

WSO Shell used in a Phishing-as-a-Service (PhaaS) 365 harvesting phishing campaign

threatinfoJanuary 13, 2024January 13, 2024

1. Initial Incident Late 2023, we observed several of our users , working in different locations with different email domains…

Microsoft Sentinel Watchlists and wildcard/partial/substring table joins in KQL
sentinel

Microsoft Sentinel Watchlists and wildcard/partial/substring table joins in KQL

threatinfoJanuary 12, 2024January 12, 2024

Watchlists are a great way to house data in a table format to be used for various purposes, be it…

Best Alternative Web Scanner to Burp Suite
Vulnerability

Best Alternative Web Scanner to Burp Suite

threatinfoOctober 28, 2023October 28, 2023

If you’re looking for a great open-source vulnerability scanner you can do a lot worse than  ZAP (Zed Attack proxy).…

Posts navigation

Older posts
Newer posts

Copyright © 2025 Threat Intelligence | Ace News by Ascendoor | Powered by WordPress.