Sitemap

MISP is the Open Source Threat Intelligence and Sharing Platform. It’s an extremely popular and powerful tool for threat intelligence. This page is where we share MISP guides, training and resources.

Cosive - The SecOps & CTI expertsAbout — CosiveCosive BlogOur Capabilities — CosiveCareers — CosiveContact Us — CosiveCybersecurity Training — CosiveDeploying MISP on KubernetesFraud DetectionFraud Detection in Banking: 2025 Guide (Updated)Fraud Detection & Prevention - Resource HubFraud Detection with SplunkFraud Detection with the ELK StackMalware Analysis - Research HubMISP Guide — CosiveHow to Use MISP: Updated 2025 GuideDeploying MISP on AWS — CosiveMISP vs. Anomali — CosiveMISP vs. CRITS — CosiveMISP vs. OpenCTI: Updated 2025 GuideMISP vs. Recorded Future — CosiveMISP vs. STIX — CosiveMISP vs. ThreatQuotient / ThreatQ — CosiveMISP vs. YETI — CosivePresentations — CosivePrivacy Policy — CosiveSecurity Assurance ServicesSecurity Consulting — CosiveSecurity Engineering & Integration Services — CosiveMeet Our Team — CosiveThreat Intelligence Services — CosiveThreat Intelligence Providers — CosiveThreat Intelligence: The CISO's Guide — CosiveWhat is a Malware Repository?Our MISP OfferingsMISP TAXII PushMISP Feeds: Updated 2025 GuideInstalling MISP with DockerMISP Yara RulesOpenCTI AlternativeBest MISP Integrations: 2025 Updated GuideBest VirusTotal Alternative: Updated 2025 GuideCosive - Thank You For Your MessageMISP SSO Login: A Basic Guide (2025)Threat Intelligence for the Modern SOC — CosiveCosive Takes 2nd Place at Splunk's 2019 AU & NZ Boss of the SOC Day — Cosive7 MISP Best Practices: Lessons from Effective Threat Intel Teams — CosiveA Tale of Two Systems: How We Integrated MISP with AssemblyLine — CosiveAnnouncing Leadership Changes at Cosive: Farewell to Kayne Naughton and Welcome Scott Ceely — CosiveAnti-phishing Strategies to Defend Your Organisation — CosiveAssemblyline 4 Services: A Guided Tour — CosiveAustralia’s New Gateway Security Guidance: What Leaders & SOC Teams Should Know — CosiveAutomating Anti Phishing Canary Credentials at Scale — CosiveBecoming a FIRST.org Member with Terry MacDonald — CosiveHow to Disrupt Phishing with Anti Phishing Canary Credentials — CosiveCosive Claims First Bounty on the Bluehat Threat Detection Platform — CosiveCosive hires ex-Deloitte Prescott Pym as Principal Consultant — CosiveCosive Partners With Feedly for Threat Intelligence — CosiveCosive's 2023 Year in Review — CosiveCosive’s Tips for Making a Happy and Productive Remote Team — CosiveCreating CTI Like a Journalist — CosiveUsing the CTI-CMM Model to Evaluate Threat Intel Program Maturity — CosiveCTI-CMM: Improving Cyber Threat Intel Maturity with Colin Connor, Terry MacDonald & Prescott Pym — CosiveCyber Threat Intelligence (CTI) Crash Course — CosiveDocIntel & MISP - Threat Intelligence Without Boiling the Ocean — CosiveDon't Shoot The Messenger: Security.txt and Collaborating Effectively With Security Researchers — CosiveEpisode #001: What Goes Wrong in Threat Intel Programs with Kayne Naughton, MD & Co-founder at Cosive — CosiveEpisode #002: Building Production-worthy Software in SecOps Teams with Chris Horsley, CTO at Cosive — CosiveEpisode #003: Securing REST API Endpoints (or How to Avoid Another Optus) with James Cooper — CosiveEpisode #004: How ChatGPT Could Transform the CTI Analyst Role with Chris Horsley — CosiveEpisode #005: Security-focused Code Review for Software Developers with Sid Odgers — CosiveEpisode #006: Securing Medical Devices with Emily Etchell — CosiveEpisode #007: How the NZITF Improves New Zealand's Security Posture with Terry MacDonald — CosiveEpisode #008: Getting Started with Cyber Threat Intelligence (CTI) with Chris Horsley — CosiveEpisode #009 - Threat Sharing Communities with Prescott Pym — CosiveEstablishing a Threat Intel Program: Principles for Security Leaders — CosiveHow to Keep Executives Safe from Malicious Actors with an “Executive Protection Program” — CosiveGetting More Out of MISP and Microsoft Sentinel — CosiveHow ChatGPT Could Transform the CTI Analyst Role — CosiveHow to Communicate Remotely — CosiveJust How Big Does MISP Data Get, Anyway? We Ran the Numbers — CosiveMeet Chris Horsley, CTO at Cosive — CosiveMeet David Zielezna, Principal Consultant at Cosive — CosiveMeet Emily Etchell, Security Consultant at Cosive — CosiveMeet Joe Cozzupoli, Field CISO and Principal Security Advisor at Cosive — CosiveMeet Prescott Pym, Principal Security Consultant at Cosive — CosiveATT&CKing with OpenAI’s ChatGPT — CosiveMy Washing Machine Refreshed My Thinking on Software Effort Estimation — CosiveRunning Your SOC Playbooks as Code: Getting Started — CosiveRunning Your SOC Playbooks as Code: Use Cases, a.k.a. Don’t Start With Phishing — CosiveSecuring REST API Endpoints (or 15 Steps to Avoid Another Optus) — CosiveSeven Great New MISP Features You May Have Missed — CosiveMeet Shanna Daly, Principal Consultant at Cosive — CosiveSOC Maturity Assessment in Australia: Our Approach — CosiveThe Opportunity Cost of Self-hosting MISP — CosiveThe Rise in Unique Malware & How to Defend Against It — CosiveUsing MISP Bookmarks with Workflows for Team Coordination — CosiveWatching Them Watching You: Opsec for Security Investigators — CosiveWhat Cosive's ME Day Means to Me — CosiveWhat Goes Wrong in Threat Intel Programs — CosiveWhat I Learned About Logging and Detection Strategies From Moving House — CosiveWhat is MISP? The Ultimate Introduction — CosiveWhy CISOs Should Care About Cyber Threat Intelligence with Joe Cozzupoli — CosiveWhy Rust is Worth the Struggle — CosiveAnti Phishing — Cosive BlogCompany Culture — Cosive BlogCompany News — Cosive BlogCybersecurity — Cosive BlogEngineering — Cosive BlogMalware Analysis — Cosive BlogPodcast — Cosive BlogSecurity Operations — Cosive BlogSOAR — Cosive BlogThreat Intelligence — Cosive BlogAndrew Hosie — CosiveAvril Frost — CosiveBarry Brailey — CosiveChris Horsley — CosiveDavid K. — CosiveDavid Zielezna — CosiveEmily Etchell — CosiveJames Cooper — CosiveJames Garratt — CosiveJoe Cozzupoli — CosiveKayne Naughton — CosiveLilith La Rose — CosiveMichelle Vui — CosivePrescott Pym — CosivePrue Owen — CosiveShanna Daly — CosiveSid Odgers — CosiveTash Postolovski — CosiveTerry MacDonald — Cosive[AISA CyberCon Canberra 2023] Extracting Threat Intel Nutrients from Unstructured Reports Using Robots: a Practical Guide — Cosive[AISA CyberCon Canberra 2023] Threat Intelligence Panel — Cosive[AISA CyberCon Canberra 2023] Threat Intelligence Without Boiling the Ocean — Cosive[AISA CyberCon Canberra 2023] What's Next for Women in Cyber? Panel — CosiveAusCERT 2109: Open Source Security Orchestration - Automating the Boring Stuff — Cosive[AWSN] Workshop - Mapping Incidents to ATT&CK — Cosive[AWSN Panel] Sydney's An Analysis of the Current Cyber Threat Landscape — CosiveWorkshop - Introduction to Digital Forensics — Cosive[Invite Only] - Workshop: Mapping Incidents to ATT&CK — CosiveKeynote: Running Your SOC Playbooks as Code — CosivePanel - Threat Intel Engineering: Building Scalable Threat Intel Programs — Cosive[SecTalks Hobart] Web Shell Hunting — CosiveActive Defence With Canary Credentials — CosiveRunning Your Security Operations Centre (SOC) Playbooks as Code — CosiveAUSCERT Podcast: CTI – The importance of info and why context matters with Chris Horsley — CosiveMaturing Your Security Team: Haste Makes Waste — CosiveThe Sorcerer's Apprentice — CosiveFocusing Security Monitoring With TTPs — CosiveCreating Cyber Threat Intelligence Like a Journalist — CosiveExtracting Threat Intel Nutrients from Unstructured CTI Reports — CosiveFrom STIX to MISP and Back Again: How Hard Could It Be? — CosiveGrowing pains with CTI? Using a Capability Maturity Model to measure and evolve threat intel programs — CosiveUsing Linux Features to Make a Hacker's Life Hard — CosivePasswords under a Cloud - Common Mistakes in Password Management — CosiveRethinking Data Visualisation for CTI — CosiveRisky Business #700 -- Yevgeny Prigozhin's empire gets owned (with Cosive's Shanna Daly) — CosiveRunning Circles Around Threat Actor Tooling Using Javascript Data Visualisation — CosiveSecOps Integrations: Evolving from the Bowie Knife to the Conveyor Belt — CosiveSnake Oilers: Pangea, Cosive and Sysdig — CosiveSTIX 2.0: Lego for Your Threat Intel — CosiveThe Glorious Theory and Sometimes Bitter Reality of Sharing CTI Packages — CosiveThreat Intelligence Without Boiling the Ocean — CosiveAntifraud - Fraud Detection Software — CosiveCustom Security Tooling Development — CosiveManaged & Hosted MISP Service - CloudMISP — CosiveCode Security Review/Audit — CosiveCSIRT / SOC Fundamentals — CosiveCTI Consulting — CosiveCTI Maturity Assessment — CosiveCTIS Consulting — CosiveCybersecurity Tabletop Exercises — CosiveEclecticIQ Curated Feeds — CosiveEclecticIQ Intelligence Centre — CosiveIntel 471 Adversary Intelligence — CosiveIntel 471 Malware Intelligence — CosiveIntroduction to STIX, TAXII and CybOX — CosiveMalwareZoo - Private Malware Repository — CosiveMISP Basics: How and Why — CosiveMISP Kickstart Training — CosiveNetwork Penetration Testing — CosiveOpen Source Intelligence for SOC Analysts — CosiveOpen Source Security Orchestration - Automating the Boring Stuff — CosiveSecurity Operations Consulting — CosiveSecurity Operations Engineering — CosiveSecurity Operations Maturity Assessment — CosiveThreat Hunting for Windows Persistence Artefacts — CosiveCTI Consulting — CosiveThreat Intelligence Engineering — CosiveUsing ATT&CK to Map Threat Intelligence to Detections — CosiveCommercial FeedsCTI TrainingCybersecurity TrainingEndpoint ProtectionFraud DetectionIncident Response ToolsMalware SandboxesSecurity AssuranceSecurity Engineering & IntegrationSecurity OperationsSecurity Operations TrainingSIEM ToolsTabletop ExercisesThreat IntelligenceThreat Intelligence Platforms (TIPs)Threat Intelligence Tools