Skip to content
Header Image

Threat Intelligence

  • Alerts
  • Downloads
  • Links
  • IOC Feeds

Banner Slider

AI sentinel SentinelOne siem

A long way to go for AI implementations in SIEM platforms

Trend Agentic AI SIEM Microsoft Sentinel Security CoPilot   SentinelOne Purple AI Purple AI supports…

September 6, 2025September 6, 2025
Nifi sentinel SentinelOne siem

Nifi Groovyscript to convert JSON table array to key value JSON format

If you have data in a nested table array you can convert it to the…

August 4, 2025August 27, 2025
SentinelOne siem

SentinelOne AI SIEM Indicator API

Ever wondered how you get the indicator tab in the SentinelOne AI SIEM alerts populated? …

August 2, 2025August 2, 2025

Editor Choice

View All
AI sentinel SentinelOne siem

A long way to go for AI implementations in SIEM platforms

September 6, 2025September 6, 2025
Nifi sentinel SentinelOne siem

Nifi Groovyscript to convert JSON table array to key value JSON format

August 4, 2025August 27, 2025

Recent News

View All

A long way to go for AI implementations in SIEM platforms

September 6, 2025September 6, 2025

Nifi Groovyscript to convert JSON table array to key value JSON format

August 4, 2025August 27, 2025

SentinelOne AI SIEM Indicator API

August 2, 2025August 2, 2025

Threat Intelligence in SentinelOne AI Siem

June 29, 2025August 2, 2025

NiFi Groovy Script to Find 1st and Last IPs in Subnet

April 23, 2025April 23, 2025
Nifi

Configuring Nifi with Azure Key Vault Secrets Parameter Providers

October 4, 2024October 4, 2024

To integrate Nifi with an Azure Key Vault follow the below steps Step 1 – Add Parameter Provider Go into…

Actor targeting Palo Alto VPN
Threat Intelligence

Actor targeting Palo Alto VPN

May 12, 2024May 13, 2024

User names used by actor seen using VPNs with Canadian source IP addresses  10/05/2024. Replace targetDomain below with the domain…

SIEM Log Ingestion – To filter or to deduplicate
logstash sentinel siem

SIEM Log Ingestion – To filter or to deduplicate

April 24, 2024April 24, 2024

Why Should You Manage Your Log Ingestion? Cost Implications SIEM tools operate under a licensing model that typically charges based…

Sentinel Parsing Data at Ingestion or at Query time
sentinel siem

Sentinel Parsing Data at Ingestion or at Query time

April 1, 2024December 10, 2024

There are different options for parsing data in Microsoft Sentinel.  Query time parsing when the parsing is done when an…

Why is the Sentinel Threat Intelligence Indicator API so full of bugs
sentinel siem Threat Intelligence

Why is the Sentinel Threat Intelligence Indicator API so full of bugs

March 14, 2024December 17, 2024

Microsoft have an API to add IOCs to the threat intelligence module in sentinel which can you read about here.…

Threat Intelligence

MISP Database Size Getting Too Large

March 11, 2024April 11, 2024

MISP MYSQL database growing too large and starting to get out of control?  API calls getting slower and slower?  Maybe…

MISP – An Internal Error has occured – HTTP Status code 500
Threat Intelligence

MISP – An Internal Error has occured – HTTP Status code 500

March 7, 2024

If you receive a “An internal error has occured” error message when clicking on various menu functions in the MISP…

Whats a threat activity cluster?
Threat Intelligence

Whats a threat activity cluster?

February 25, 2024December 24, 2024

A threat activity cluster is a grouping of security alerts which are related to a unique or similar activity taking place in…

Filebeat write: failed to publish events / connection reset by peer
filebeat logstash sentinel

Filebeat write: failed to publish events / connection reset by peer

January 18, 2024January 18, 2024

I was using filebeat to listen on port 514 to accept rsyslog messages from AIX servers with the aim of…

WSO Shell used in a Phishing-as-a-Service (PhaaS) 365 harvesting phishing campaign
Threat Intelligence

WSO Shell used in a Phishing-as-a-Service (PhaaS) 365 harvesting phishing campaign

January 13, 2024January 13, 2024

1. Initial Incident Late 2023, we observed several of our users , working in different locations with different email domains…

Posts navigation

Older posts
Newer posts

Copyright © 2025 Threat Intelligence | Ace News by Ascendoor | Powered by WordPress.