Don't forget to use @misp feed overlap matrix. It's a quick way to spot the overlapping/similar feeds from different sources such as external CTI feeds but also the cached MISP instances.
If you want to check on your instance, it's in /feeds/compareFeeds
Finally it is there: A GUI version of PortexAnalyzer🔎
PortexAnalyzer is a free PE parser tailored for malware analysis. It uses the library PortEx.
🔽Download: https://github.com/struppigel/PortexAnalyzerGUI/releases
#PortEx #PortexAnalyzer
Auto-sync from birdsite
This will probably be my last direct post to Twitter. My account may or may not stay active, and I may or may not get to delete old posts. Auto-syncing from @rene_mobile has now been disabled. Please follow me on the Fediverse for further updates.
If you're trying to find journalists on Mastodon, I've created a verified database of several hundred here: http://presscheck.org. Since the backlog has become enormous, the unverified waiting list is now public also: http://presscheck.org/pending
On le sait, l'attribution d'une cyber-attaque (« c'est les Chinois ! ») est un exercice difficile. Il faut analyser l'attaque, parvenir à une certitude et, ensuite, assumer de révéler publiquement l'origine. Le livre de Mark Corcoral étudie cette question de l'attribution notamment sous l'angle des accusations par les États-Unis : comment se fait l'attribution publique et suivant quels méandres politiques ?