F0rm4t
2024-12-16

How GenAI can be used to transform ๐ฎ๐ง๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž๐ ๐œ๐ฒ๐›๐ž๐ซ ๐ญ๐ก๐ซ๐ž๐š๐ญ ๐ซ๐ž๐ฉ๐จ๐ซ๐ญ๐ฌ ๐ข๐ง๐ญ๐จ ๐’๐“๐ˆ๐— 2.1 ๐›๐ฎ๐ง๐๐ฅ๐ž๐ฌ
medium.com/@antonio.formato/fr
GitHub: github.com/format81/GenAI-STIX
#threatintelligence #GenAI #stix #timindmap #openai #llm #cyber #Security #CyberSecurity

F0rm4t boosted:
Rami Krispin :unverified:ramikrispin@mstdn.social
2024-07-06
F0rm4t boosted:
Rami Krispin :unverified:ramikrispin@mstdn.social
2024-07-06

(๐Ÿงต1/2) Data discovery with GraphRAG ๐Ÿš€

Microsoft open-sourced this week GraphRAG, a Python library for extracting insights from unstructured text using LLMs. The GraphRAG uses LLM-generated knowledge graphs to extract information and answer questions from private datasets and documentation.

Installation ๐Ÿ› ๏ธ: ๐˜ฑ๐˜ช๐˜ฑ ๐˜ช๐˜ฏ๐˜ด๐˜ต๐˜ข๐˜ญ๐˜ญ ๐˜จ๐˜ณ๐˜ข๐˜ฑ๐˜ฉ๐˜ณ๐˜ข๐˜จ

License ๐Ÿชช: MIT ๐Ÿฆ„

#Python #OpenSource #AI #DataScience #LLM #MachineLearning

2024-06-15

๐Ÿ”ˆMonthly release of ๐–๐ก๐š๐ญ'๐ฌ ๐ง๐ž๐ฐ ๐ข๐ง ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ | ๐Œ๐š๐ฒ 2024. ๐Ÿ”ˆ
Article and tool co-authored with Oleksiy Meletskiy.
๐Ÿ“ข New Features:
โžก๐–๐ซ๐ข๐ญ๐ž-๐ฎ๐ฉ ๐ฌ๐œ๐ซ๐ž๐ž๐ง๐ฌ๐ก๐จ๐ญ
โžก๐•๐ข๐ซ๐ฎ๐ฌ๐“๐จ๐ญ๐š๐ฅ ๐ˆ๐Ž๐‚๐ฌ ๐ž๐ง๐ซ๐ข๐œ๐ก๐ฆ๐ž๐ง๐ญ
โžก๐„๐ฆ๐›๐ž๐๐๐ž๐ ๐Œ๐ˆ๐“๐‘๐„ ๐€๐“๐“&๐‚๐Šยฎ ๐๐š๐ฏ๐ข๐ ๐š๐ญ๐จ๐ซ
โžก๐๐ƒ๐… ๐ซ๐ž๐ฉ๐จ๐ซ๐ญ ๐ข๐ฆ๐ฉ๐ซ๐จ๐ฏ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ

๐Ÿ“ฐ๐๐ฅ๐จ๐ : lnkd.in/dgTnd-uD

๐Ÿ’ป ๐€๐ฉ๐ฉ: lnkd.in/dSVdG2B4
โฉ ๐†๐ข๐ญ๐‡๐ฎ๐›: lnkd.in/dJDSQx8Y

๐‡๐จ๐ฐ ๐ญ๐จ ๐ ๐ž๐ญ ๐ข๐ง๐ฏ๐จ๐ฅ๐ฏ๐ž๐
The project is open to external contributions.
To collaborate, please check the GitHub repository: lnkd.in/dJDSQx8Y

If you find TI Mindmap useful, please consider starring โญ the repository on GitHub.
hashtag

#timindmap #ti #mindmap hashtag#mistral #ai #mistralai #threatintelligence #llm #llmapp #openai #azureopenai #largelanguagemodel #cybersecurity #cyber #security #python #streamlit #infer #embedding #chat #ioc #mitre
#ttp #cyberreport #report #mermaid #genai #generativeai #cyberthreatintelligence #github #prompt #promptengineering #FewShotPrompting #gpt hashtag#gpt4 #api #DataVisualization #threat #infosec #threatreport hashtag#oai #analyst #soc #cert #thumbnail #virustotal #stix #GPTo

2024-06-15

๐ŸŒŸ Excited to announce that I'll be presenting a talk at ๐๐’๐ข๐๐ž๐ฌ ๐€๐ญ๐ก๐ž๐ง๐ฌ on June 29th! ๐ŸŒŸ
๐ŸŽค Title of the talk: "๐…๐ซ๐จ๐ฆ ๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐ฅ๐ฎ๐ ๐ž ๐ญ๐จ ๐€๐œ๐ญ๐ข๐จ๐ง๐š๐›๐ฅ๐ž ๐ˆ๐ง๐ฌ๐ข๐ ๐ก๐ญ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐‹๐‹๐Œ๐ฌ: ๐ˆ๐ง๐ญ๐ซ๐จ๐๐ฎ๐œ๐ข๐ง๐  ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ"

๐Ÿ“œ I'll introduce TI Mindmap, an open-source project designed to empower Infosec professionals in navigating the complexities of Threat Intelligence write-ups. I'll explore how TI Mindmap leverages the capabilities of LLMs to enhance the efficiency of processing and extracting crucial information from a variety of Threat Intelligence sources.

Key Features of TI Mindmap:
โ–ถSummarizing Threat Intelligence articles
โ–ถMapping entity relationships with Mindmaps
โ–ถEngaging in AI-driven chats on your data
โ–ถGenerating comprehensive PDF reports
โ–ถIOCs extraction
โ–ถExtract adversary tactics, techniques, and procedures
โ–ถTTPs by execution time

During the session, I'll not only showcase the capabilities of TI Mindmap but also share insights from development journey. I'll discuss the challenges we've encountered, the lessons we've learned, and the future directions of this open-source project.

๐Ÿ”— Learn more about TI Mindmap, GitHub Repository: lnkd.in/dJDSQx8Y

BSides Athens: bsidesath.gr/
Tracks: lnkd.in/dC9znupr

#BSidesAthens #Cybersecurity #ThreatIntelligence #OpenSource #LLMs hashtag#AIdriven #TIMindmap #streamlit hashtag#mermaid #mindmap #TI #genai #python #mistral #openai #azureopenai #stix #ttp #conference #bsides

2024-05-08

๐†๐ž๐ญ๐ญ๐ข๐ง๐  ๐ฌ๐ญ๐š๐ซ๐ญ๐ž๐ ๐ฐ๐ข๐ญ๐ก ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญโ€™๐ฌ ๐๐ก๐ข-3 ๐จ๐ง ๐Ž๐ฅ๐ฅ๐š๐ฆ๐š

My initial journey into Small Language Models

medium.com/@antonio.formato/ge

#genai #ollama #phi3 #microsoft #smalllanguagemodel #sml #llm #language #reasoning #coding #prompt #generative #ai #azure #app

2024-05-05

New ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ demo in action. ๐Ÿ“ฝ
New features coming soon, stay tuned. ๐Ÿ†•

๐’๐ญ๐ซ๐ž๐š๐ฆ๐ฅ๐ข๐ญ ๐€๐ฉ๐ฉ: ti-mindmap-gpt.streamlit.app/ ๐Ÿ’ฟ
๐†๐ข๐ญ๐‡๐ฎ๐›: github.com/format81/TI-Mindmap โœจ

๐–๐ซ๐ข๐ญ๐ž-๐ฎ๐ฉ used in the demo: microsoft.com/en-us/security/b

๐˜š๐˜ฑ๐˜ฐ๐˜ช๐˜ญ๐˜ฆ๐˜ณ: ๐˜ช๐˜ง ๐˜บ๐˜ฐ๐˜ถ ๐˜ธ๐˜ข๐˜ต๐˜ค๐˜ฉ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ท๐˜ช๐˜ฅ๐˜ฆ๐˜ฐ ๐˜ค๐˜ข๐˜ณ๐˜ฆ๐˜ง๐˜ถ๐˜ญ๐˜ญ๐˜บ, ๐˜บ๐˜ฐ๐˜ถ ๐˜ธ๐˜ฐ๐˜ถ๐˜ญ๐˜ฅ ๐˜ฉ๐˜ข๐˜ท๐˜ฆ ๐˜ฏ๐˜ฐ๐˜ต๐˜ช๐˜ค๐˜ฆ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ด๐˜ถ๐˜ฑ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต ๐˜ง๐˜ฐ๐˜ณ ๐˜”๐˜ช๐˜ด๐˜ต๐˜ณ๐˜ข๐˜ญ๐˜ˆ๐˜. ๐Ÿ˜Š

#timindmap #mindmap #streamlit #threatintelligence #cyberthreatintelligence #openai #azure #azureopenai #mistral #mistralai #python #llm #ai #genai #embeddings #completition

2024-04-05

๐Ÿ”ˆSecond monthly release of ๐–๐ก๐š๐ญ'๐ฌ ๐ง๐ž๐ฐ ๐ข๐ง ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ | ๐ฆ๐š๐ซ 2024. ๐Ÿ”ˆ
Article and tool co-authored with Oleksiy Meletskiy.

๐Ÿ“ข New Features:
โžกSession management
โžกScraping enhancements
โžกCode optimization
โžกPDF Report enhancements
โžกMitre ATT&CK Navigator layer

๐Ÿ“ฐ๐๐ฅ๐จ๐ : lnkd.in/diuJTfrH
๐Ÿ’ป ๐€๐ฉ๐ฉ: lnkd.in/dSVdG2B4
โฉ ๐†๐ข๐ญ๐‡๐ฎ๐›: lnkd.in/dJDSQx8Y

๐‡๐จ๐ฐ ๐ญ๐จ ๐ ๐ž๐ญ ๐ข๐ง๐ฏ๐จ๐ฅ๐ฏ๐ž๐
The project is open to external contributions.
To collaborate, please check the GitHub repository: lnkd.in/dJDSQx8Y

If you find TI Mindmap useful, please consider starring โญ the repository on GitHub.

#timindmap #ti #mindmap #threatintelligence #llm #llmapp #openai #azureopenai #largelanguagemodel #cybersecurity #cyber #security #python #streamlit #infer #embedding #chat #ioc #mitre #ttp #cyberreport #report #mermaid #genai #generativeai #cyberthreatintelligence
#github #prompt #promptengineering #FewShotPrompting #gpt #gpt4
#api #DataVisualization #threat #infosec #threatreport #oai #analyst #soc

2024-03-01

Excited to share a series of periodic articles on the developments of TI Mindmap: ๐–๐ก๐š๐ญโ€™๐ฌ ๐ง๐ž๐ฐ ๐ข๐ง ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ, first issue.
Article and tool co-authored with Oleksiy Meletskiy.

New Features:
โžกExtract adversary tactics, techniques, and procedures
โžกTactics, techniques and procedures by execution time
โžกTactics, techniques and procedures timeline
โžกAI Chat on your article
โžกMermaid live editor integration
โžกPDF report
โžกTweet Mindmap

๐‡๐จ๐ฐ ๐ญ๐จ ๐ ๐ž๐ญ ๐ข๐ง๐ฏ๐จ๐ฅ๐ฏ๐ž๐
The project is open to external contributions.
To collaborate, please check the GitHub repository: github.com/format81/TI-Mindmap
If you find TI Mindmap useful, please consider starring the repository on GitHub.

To learn more:
medium.com/@antonio.formato/wh

#timindmap #ti #mindmap #threatintelligence #llm #llmapp #openai #azureopenai #largelanguagemodel #cybersecurity #cyber #security #python #streamlit #infer #embedding #chat #ioc #mitre #ttp #cyberreport #report #mermaid #genai #generativeai #cyberthreatintelligence
#github #prompt #promptengineering #FewShotPrompting #gpt #gpt4
#api #DataVisualization #threat #infosec #threatreport #oai #analyst #soc #cert

2024-02-22

๐€๐ง๐ง๐จ๐ฎ๐ง๐œ๐ข๐ง๐  ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญโ€™๐ฌ ๐จ๐ฉ๐ž๐ง ๐š๐ฎ๐ญ๐จ๐ฆ๐š๐ญ๐ข๐จ๐ง ๐Ÿ๐ซ๐š๐ฆ๐ž๐ฐ๐จ๐ซ๐ค ๐ญ๐จ ๐ซ๐ž๐ ๐ญ๐ž๐š๐ฆ ๐ ๐ž๐ง๐ž๐ซ๐š๐ญ๐ข๐ฏ๐ž ๐€๐ˆ ๐’๐ฒ๐ฌ๐ญ๐ž๐ฆ๐ฌ

๐๐ฒ๐‘๐ˆ๐“ automates AI Red Teaming tasks to allow operators to focus on more complicated and time-consuming tasks and can also identify security harms such as misuse (e.g., malware generation, jailbreaking), and privacy harms (e.g., identity theft).โ€‹

Find out more:

microsoft.com/en-us/security/b

GitHub repo: github.com/Azure/PyRIT

How to Guide: github.com/Azure/PyRIT/blob/ma

#redteam #airedteam #redteaming #PyRIT #ml #ai #framewrok #python #cyber #llm #ai #aisecurity #microsoft #microsoftsecurity #opensource #MicrosoftAIRedTeam #GenAI #jailbreaking #promtp #promptinjection #malware #privacy #responsibleai #cybersecurity #aisecurity #secureai #machinelearning #generativeai

2024-02-21

No cybersecurity and genAI in this post, just a bit of coding. ๐Ÿ˜‰

๐Œ๐ž๐ซ๐ฆ๐š๐ข๐.๐ฅ๐ข๐ฏ๐ž ๐‚๐จ๐๐ž ๐‘๐ž๐ง๐๐ž๐ซ๐ž๐ซ: encode-mermaid-diagram.streaml

๐Ÿš€ I've just developed a Streamlit app that takes input in Mermaid.js code and outputs a rendered link for mermaid.live.

This functionality enables users to seamlessly edit their code, addressing any errors or dynamically modifying the diagram as needed. I believe this tool could be useful for those working with Mermaid charts.

Feel free to check it out and see how it can streamline your workflow!

Read more:

medium.com/@antonio.formato/me

Spoiler: soon this will be an integrated feature in ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ: ti-mindmap-gpt.streamlit.app/ ๐Ÿ“Šโœจ

#Streamlit #MermaidJS #DataVisualization #pyhton #mermaid #timindmap #coding

2024-02-19

I share this report generated with ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ.

Tool: ti-mindmap-gpt.streamlit.app/

I invite you to contribute and add a star on GitHub: github.com/format81/TI-Mindmap

Title: ๐๐ž๐›๐ฎ๐ฅ๐š ๐๐ซ๐จ๐ค๐ž๐ซ: ๐ˆ๐ญ๐š๐ฅ๐ข๐š๐ง-๐›๐š๐ฌ๐ž๐ ๐“๐ก๐ซ๐ž๐š๐ญ ๐Ž๐ฉ๐ž๐ซ๐š๐ญ๐ข๐จ๐ง

Summary: ๐˜›๐˜ฉ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต ๐˜ฑ๐˜ณ๐˜ฆ๐˜ด๐˜ฆ๐˜ฏ๐˜ต๐˜ด ๐˜ข๐˜ฏ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ด๐˜ช๐˜ด ๐˜ฐ๐˜ง ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ฐ๐˜ฑ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ค๐˜ฐ๐˜ฏ๐˜ฅ๐˜ถ๐˜ค๐˜ต๐˜ฆ๐˜ฅ ๐˜ฃ๐˜บ ๐˜ข๐˜ฏ ๐˜๐˜ต๐˜ข๐˜ญ๐˜ช๐˜ข๐˜ฏ ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜ข๐˜ค๐˜ต๐˜ฐ๐˜ณ ๐˜ฌ๐˜ฏ๐˜ฐ๐˜ธ๐˜ฏ ๐˜ข๐˜ด ๐˜•๐˜ฆ๐˜ฃ๐˜ถ๐˜ญ๐˜ข ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ. ๐˜š๐˜ช๐˜ฏ๐˜ค๐˜ฆ ๐˜ฆ๐˜ข๐˜ณ๐˜ญ๐˜บ 2020, ๐˜•๐˜ฆ๐˜ฃ๐˜ถ๐˜ญ๐˜ข ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ ๐˜ฉ๐˜ข๐˜ด ๐˜ฆ๐˜ฎ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ๐˜ฆ๐˜ฅ ๐˜ค๐˜ถ๐˜ด๐˜ต๐˜ฐ๐˜ฎ-๐˜ฎ๐˜ข๐˜ฅ๐˜ฆ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ต๐˜ฐ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฑ๐˜ณ๐˜ฐ๐˜ฎ๐˜ช๐˜ด๐˜ฆ ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด ๐˜ฎ๐˜ข๐˜ช๐˜ฏ๐˜ญ๐˜บ ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ฑ๐˜ฐ๐˜ณ๐˜ต ๐˜ข๐˜ฏ๐˜ฅ ๐˜ข๐˜ฆ๐˜ณ๐˜ฐ๐˜ฏ๐˜ข๐˜ถ๐˜ต๐˜ช๐˜ค๐˜ด ๐˜ช๐˜ฏ๐˜ฅ๐˜ถ๐˜ด๐˜ต๐˜ณ๐˜ช๐˜ฆ๐˜ด. ๐˜›๐˜ฉ๐˜ฆ ๐˜ท๐˜ช๐˜ณ๐˜ถ๐˜ด'๐˜ด ๐˜ฑ๐˜ฆ๐˜ณ๐˜ท๐˜ข๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ฑ๐˜ณ๐˜ฆ๐˜ด๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ข๐˜ค๐˜ณ๐˜ฐ๐˜ด๐˜ด ๐˜ท๐˜ข๐˜ณ๐˜ช๐˜ฐ๐˜ถ๐˜ด ๐˜ด๐˜ฆ๐˜ค๐˜ต๐˜ฐ๐˜ณ๐˜ด ๐˜ช๐˜ฎ๐˜ฑ๐˜ญ๐˜ช๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜ข๐˜ค๐˜ต๐˜ฐ๐˜ณ ๐˜ช๐˜ด ๐˜ฑ๐˜ถ๐˜ณ๐˜ด๐˜ถ๐˜ช๐˜ฏ๐˜จ ๐˜ข ๐˜ฏ๐˜ฐ๐˜ฏ-๐˜ต๐˜ข๐˜ณ๐˜จ๐˜ฆ๐˜ต๐˜ฆ๐˜ฅ ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ด๐˜ต๐˜ณ๐˜ข๐˜ต๐˜ฆ๐˜จ๐˜บ, ๐˜ข๐˜ฏ ๐˜ข๐˜ด๐˜ด๐˜ถ๐˜ฎ๐˜ฑ๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ด๐˜ต๐˜ณ๐˜ฆ๐˜ฏ๐˜จ๐˜ต๐˜ฉ๐˜ฆ๐˜ฏ๐˜ฆ๐˜ฅ ๐˜ฃ๐˜บ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ'๐˜ด ๐˜œ๐˜š๐˜‰ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ฑ๐˜ข๐˜จ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ค๐˜ข๐˜ฑ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด.

๐˜•๐˜ฆ๐˜ฃ๐˜ถ๐˜ญ๐˜ข ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ ๐˜ด๐˜ฉ๐˜ฐ๐˜ธ๐˜ค๐˜ข๐˜ด๐˜ฆ๐˜ด ๐˜ฅ๐˜ช๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜ค๐˜ต ๐˜›๐˜›๐˜—๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ฆ๐˜ท๐˜ฐ๐˜ญ๐˜ท๐˜ฆ ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ ๐˜ต๐˜ช๐˜ฎ๐˜ฆ. ๐˜๐˜ณ๐˜ฐ๐˜ฎ ๐˜ฃ๐˜ถ๐˜ค๐˜ฐ๐˜ญ๐˜ช๐˜ค ๐˜ฐ๐˜ฃ๐˜ง๐˜ถ๐˜ด๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฆ๐˜ฏ๐˜ค๐˜ฐ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ฆ๐˜ฎ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ ๐˜ช๐˜ฏ๐˜ต๐˜ฆ๐˜ณ๐˜ฎ๐˜ฆ๐˜ฅ๐˜ช๐˜ข๐˜ต๐˜ฆ ๐˜Ž๐˜ช๐˜ต๐˜๐˜ถ๐˜ฃ-๐˜ฉ๐˜ฐ๐˜ด๐˜ต๐˜ฆ๐˜ฅ ๐˜ง๐˜ช๐˜ญ๐˜ฆ๐˜ด ๐˜ง๐˜ช๐˜ญ๐˜ญ๐˜ฆ๐˜ฅ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ฃ๐˜ญ๐˜ข๐˜ฏ๐˜ฌ ๐˜ด๐˜ฑ๐˜ข๐˜ค๐˜ฆ๐˜ด ๐˜ต๐˜ฐ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ถ๐˜ด๐˜ฆ ๐˜ฐ๐˜ง ๐˜ฑ๐˜ญ๐˜ข๐˜ต๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ด ๐˜ญ๐˜ช๐˜ฌ๐˜ฆ ๐˜๐˜ช๐˜ฎ๐˜ฆ๐˜ฐ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ˆ๐˜ณ๐˜ด๐˜›๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ค๐˜ข ๐˜ง๐˜ฐ๐˜ณ ๐˜ค๐˜ฐ๐˜ฅ๐˜ฆ ๐˜ฉ๐˜ฐ๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜จ.

๐˜ˆ ๐˜ฅ๐˜ฆ๐˜ต๐˜ข๐˜ช๐˜ญ๐˜ฆ๐˜ฅ ๐˜ช๐˜ฏ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ'๐˜ด ๐˜ฐ๐˜ฑ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ณ๐˜ฆ๐˜ท๐˜ฆ๐˜ข๐˜ญ๐˜ด ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ต ๐˜ฅ๐˜ฐ๐˜ธ๐˜ฏ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ๐˜ด ๐˜ฐ๐˜ง ๐˜ข๐˜ฅ๐˜ฅ๐˜ช๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ ๐˜ฑ๐˜ข๐˜บ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ๐˜ด ๐˜ถ๐˜ฑ๐˜ฐ๐˜ฏ ๐˜ญ๐˜ข๐˜ถ๐˜ฏ๐˜ค๐˜ฉ๐˜ช๐˜ฏ๐˜จ ๐˜™๐˜ถ๐˜ฏ๐˜ต๐˜ช๐˜ฎ๐˜ฆ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ.๐˜ฆ๐˜น๐˜ฆ. ๐˜‹๐˜ฐ๐˜ฎ๐˜ข๐˜ช๐˜ฏ๐˜ด ๐˜ข๐˜ณ๐˜ฆ ๐˜ข๐˜ญ๐˜ด๐˜ฐ ๐˜ณ๐˜ฆ๐˜จ๐˜ถ๐˜ญ๐˜ข๐˜ณ๐˜ญ๐˜บ ๐˜ด๐˜ธ๐˜ช๐˜ต๐˜ค๐˜ฉ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ข๐˜ท๐˜ฐ๐˜ช๐˜ฅ ๐˜ฑ๐˜ณ๐˜ฆ๐˜ฅ๐˜ช๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ด๐˜ช๐˜ด ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ค๐˜บ๐˜ฃ๐˜ฆ๐˜ณ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ต๐˜ฆ๐˜ข๐˜ฎ. ๐˜›๐˜ฉ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต ๐˜ค๐˜ฐ๐˜ฏ๐˜ง๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ต๐˜ญ๐˜บ ๐˜ข๐˜ต๐˜ต๐˜ณ๐˜ช๐˜ฃ๐˜ถ๐˜ต๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ด ๐˜ต๐˜ฐ ๐˜•๐˜ฆ๐˜ฃ๐˜ถ๐˜ญ๐˜ข ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ด๐˜ฐ๐˜ญ๐˜ช๐˜ฅ ๐˜ฆ๐˜ท๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ, ๐˜ช๐˜ฏ๐˜ค๐˜ญ๐˜ถ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ถ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ฏ๐˜ข๐˜ฎ๐˜ช๐˜ฏ๐˜จ ๐˜ค๐˜ฐ๐˜ฏ๐˜ท๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜๐˜ต๐˜ข๐˜ญ๐˜ช๐˜ข๐˜ฏ ๐˜ฎ๐˜ข๐˜ฏ๐˜ช๐˜ง๐˜ฆ๐˜ด๐˜ต๐˜ด ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜จ๐˜ฆ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ฆ๐˜ฅ ๐˜™๐˜ถ๐˜ฏ๐˜ต๐˜ช๐˜ฎ๐˜ฆ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ.๐˜ฆ๐˜น๐˜ฆ ๐˜ง๐˜ช๐˜ญ๐˜ฆ๐˜ด.

๐˜๐˜ฐ๐˜ณ ๐˜ฅ๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ฑ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต๐˜ถ๐˜ฏ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด, ๐˜ฌ๐˜ฆ๐˜บ ๐˜๐˜–๐˜Š๐˜ด ๐˜ช๐˜ฏ๐˜ค๐˜ญ๐˜ถ๐˜ฅ๐˜ฆ ๐˜ถ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ ๐˜ฏ๐˜ข๐˜ฎ๐˜ช๐˜ฏ๐˜จ ๐˜ฑ๐˜ข๐˜ต๐˜ต๐˜ฆ๐˜ณ๐˜ฏ๐˜ด ๐˜ช๐˜ฏ ๐˜ด๐˜ฐ๐˜ฎ๐˜ฆ ๐˜ด๐˜ข๐˜ฎ๐˜ฑ๐˜ญ๐˜ฆ๐˜ด, ๐˜ฅ๐˜ช๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜ค๐˜ต ๐˜Š2๐˜ด ๐˜ถ๐˜ต๐˜ช๐˜ญ๐˜ช๐˜ป๐˜ฆ๐˜ฅ, ๐˜ฆ๐˜ฏ๐˜ค๐˜ฐ๐˜ฅ๐˜ฆ๐˜ฅ ๐˜ง๐˜ช๐˜ญ๐˜ฆ๐˜ด ๐˜ฆ๐˜น๐˜ฑ๐˜ญ๐˜ฐ๐˜ช๐˜ต๐˜ฆ๐˜ฅ ๐˜ง๐˜ฐ๐˜ณ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ฑ๐˜ข๐˜จ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฑ๐˜ณ๐˜ฆ๐˜ด๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ฐ๐˜ง ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ช๐˜ง๐˜ช๐˜ค ๐˜ง๐˜ช๐˜ญ๐˜ฆ๐˜ด ๐˜ด๐˜ถ๐˜ค๐˜ฉ ๐˜ข๐˜ด โ€œ๐˜™๐˜ถ๐˜ฏ๐˜ต๐˜ช๐˜ฎ๐˜ฆ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ.๐˜ฆ๐˜น๐˜ฆโ€.

Original blog by Fortgale: fortgale.com/blog/featured/neb

#timindmap #threatintelligence #ai #genai #openai #azureopenai #azure #ioc #ttp #timeline #soc #llm

2024-02-18

๐‚๐จ๐ฉ๐ข๐ฅ๐จ๐ญ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ: ๐ž๐ฅ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ ๐จ๐Ÿ ๐š๐ง ๐ž๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐ฉ๐ซ๐จ๐ฆ๐ฉ๐ญ

From the "Get started with Microsoft Copilot for Security" online training, I highlight this interesting in-depth analysis.

๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐ฉ๐ซ๐จ๐ฆ๐ฉ๐ญ๐ฌ give Copilot adequate and useful parameters to generate a valuable response. Security analysts or researchers should include the following elements when writing a prompt.

๐Ÿ’ก ๐†๐จ๐š๐ฅ - specific, security-related information that you need

๐Ÿ’ก๐‚๐จ๐ง๐ญ๐ž๐ฑ๐ญ - why you need this information or how you'll use it

๐Ÿ’ก๐„๐ฑ๐ฉ๐ž๐œ๐ญ๐š๐ญ๐ข๐จ๐ง๐ฌ - format or target audience you want the response tailored to

๐Ÿ’ก๐’๐จ๐ฎ๐ซ๐œ๐ž - known information, data sources, or plugins Copilot should use

At this link other prompting tips:

learn.microsoft.com/en-us/trai

Full training: learn.microsoft.com/en-us/trai

#copilot #copilotforsecurity #securitycopilot #microsoft #microosoftsecurity #llm #openai #azureopenai #llmapps #soc #generativeai #genai #cybersecurity #azure #cloudsecurity #cloudnative #defender #sentinel #microsoftsentinel #xdr #defenderxdr #prompt #promptengineering

2024-02-16

๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐ฎ๐ง๐ฆ๐š๐ง๐š๐ ๐ž๐ ๐จ๐ซ 3๐ซ๐ ๐ฉ๐š๐ซ๐ญ๐ฒ ๐Œ๐ƒ๐Œ ๐ฆ๐š๐ง๐š๐ ๐ž๐ ๐ข๐Ž๐’/๐€๐ง๐๐ซ๐จ๐ข๐ ๐๐ž๐ฏ๐ข๐œ๐ž๐ฌ ๐ฐ๐ข๐ญ๐ก ๐Œ๐ƒ๐„

In this blog post, you will learn how to protect unmanaged (personal) or 3rd party MDM managed iOS and Android devices with Microsoft Defender for Endpoint as your Mobile Threat Defense (MTD) solution.

The solution leverages Intuneโ€™s App Protection Policies aka MAM to enforce Device Protection with MDE regardless of the device enrollment state.

techcommunity.microsoft.com/t5

#mde #defender #defenderforendpoint #mtd #mobile #mobileprotection #mobilerhreatdefence #edr #xdr #microsoft #microsoftsecurity #soc #intune #mdm #mam #byod #ios #android #cloudnative

2024-02-14

๐Ÿš€ Excited to share our latest #CyberSignals report for February 2024! ๐Ÿ›ก๏ธ

This edition explores the profound effects of AI on cybersecurity, highlighting its dual role as both a powerful defender in enhancing security protocols and a potential vector for cyber threats.

Key insights include:

โ–ถ AI's pivotal function in addressing the global shortage of cybersecurity talent.

โ–ถThe significant improvement in accuracy and efficiency of security operations through tools like Copilot for Security.

โ–ถOur strategies for counteracting AI-powered threats to promote a secure online environment.

news.microsoft.com/wp-content/

#Cybersecurity #AI #Microsoft #OpenAI #DigitalDefense #Innovation #genai #cybersecurity #aisecurity #cloud #cloudsecurity #llm #copilot #threat #microsoftsecurity

2024-02-14

๐€๐ง๐ง๐จ๐ฎ๐ง๐œ๐ข๐ง๐  ๐ง๐ž๐ฐ ๐Ÿ๐ž๐š๐ญ๐ฎ๐ซ๐ž๐ฌ ๐š๐ง๐ ๐ข๐ฆ๐ฉ๐ซ๐จ๐ฏ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ ๐ข๐ง ๐€๐ณ๐ฎ๐ซ๐ž ๐…๐ข๐ซ๐ž๐ฐ๐š๐ฅ๐ฅ

โžกFlow Trace logs are now generally available.

โžกAutoscaling based on the number of connections is now generally available.

โžกParallel IP Group update support is now in public preview.

techcommunity.microsoft.com/t5

#azure #firewall #azurefirewall #cloudfirewall #cloudsecurity #network #networksecurity #monitoring #soc #monitoring #azurenetworksecurity #cloudnative

2024-02-10

Let's test ๐“๐ˆ ๐Œ๐ข๐ง๐๐ฆ๐š๐ฉ with this interesting article: mandiant.com/resources/blog/un

๐€๐ณ๐ฎ๐ซ๐ž ๐Ž๐ฉ๐ž๐ง๐€๐ˆ ๐†๐ž๐ง๐ž๐ซ๐š๐ญ๐ž๐ ๐’๐ฎ๐ฆ๐ฆ๐š๐ซ๐ฒ

๐˜›๐˜ฉ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต ๐˜ฅ๐˜ฐ๐˜ค๐˜ถ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฐ๐˜ฏ๐˜จ๐˜ฐ๐˜ช๐˜ฏ๐˜จ ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ท๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜ข๐˜ค๐˜ต๐˜ฐ๐˜ณ ๐˜จ๐˜ณ๐˜ฐ๐˜ถ๐˜ฑ ๐˜œ๐˜•๐˜Š4990, ๐˜ธ๐˜ฉ๐˜ช๐˜ค๐˜ฉ ๐˜ฑ๐˜ณ๐˜ช๐˜ฎ๐˜ข๐˜ณ๐˜ช๐˜ญ๐˜บ ๐˜ต๐˜ข๐˜ณ๐˜จ๐˜ฆ๐˜ต๐˜ด ๐˜ถ๐˜ด๐˜ฆ๐˜ณ๐˜ด ๐˜ฃ๐˜ข๐˜ด๐˜ฆ๐˜ฅ ๐˜ช๐˜ฏ ๐˜๐˜ต๐˜ข๐˜ญ๐˜บ. ๐˜œ๐˜•๐˜Š4990, ๐˜ญ๐˜ช๐˜ฌ๐˜ฆ๐˜ญ๐˜บ ๐˜ฎ๐˜ฐ๐˜ต๐˜ช๐˜ท๐˜ข๐˜ต๐˜ฆ๐˜ฅ ๐˜ฃ๐˜บ ๐˜ง๐˜ช๐˜ฏ๐˜ข๐˜ฏ๐˜ค๐˜ช๐˜ข๐˜ญ ๐˜จ๐˜ข๐˜ช๐˜ฏ, ๐˜ฉ๐˜ข๐˜ด ๐˜ฃ๐˜ฆ๐˜ฆ๐˜ฏ ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜ด๐˜ช๐˜ฏ๐˜ค๐˜ฆ 2020. ๐˜›๐˜ฉ๐˜ฆ ๐˜จ๐˜ณ๐˜ฐ๐˜ถ๐˜ฑ ๐˜ฆ๐˜ฎ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ๐˜ด ๐˜œ๐˜š๐˜‰ ๐˜ฅ๐˜ฆ๐˜ท๐˜ช๐˜ค๐˜ฆ๐˜ด ๐˜ง๐˜ฐ๐˜ณ ๐˜ช๐˜ฏ๐˜ช๐˜ต๐˜ช๐˜ข๐˜ญ ๐˜ช๐˜ฏ๐˜ง๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฆ๐˜ท๐˜ฐ๐˜ญ๐˜ท๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ฆ๐˜ช๐˜ณ ๐˜ต๐˜ฐ๐˜ฐ๐˜ญ๐˜ด, ๐˜ต๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ค๐˜ฆ๐˜ฅ๐˜ถ๐˜ณ๐˜ฆ๐˜ด (๐˜›๐˜›๐˜—๐˜ด) ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ ๐˜ต๐˜ช๐˜ฎ๐˜ฆ. ๐˜›๐˜ฉ๐˜ฆ ๐˜ข๐˜ค๐˜ต๐˜ฐ๐˜ณ ๐˜ฉ๐˜ข๐˜ด ๐˜ฑ๐˜ณ๐˜ฐ๐˜จ๐˜ณ๐˜ฆ๐˜ด๐˜ด๐˜ฆ๐˜ฅ ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ถ๐˜ด๐˜ช๐˜ฏ๐˜จ ๐˜ฃ๐˜ฆ๐˜ฏ๐˜ช๐˜จ๐˜ฏ ๐˜ฆ๐˜ฏ๐˜ค๐˜ฐ๐˜ฅ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฆ๐˜น๐˜ต ๐˜ง๐˜ช๐˜ญ๐˜ฆ๐˜ด ๐˜ต๐˜ฐ ๐˜ฉ๐˜ฐ๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜ฑ๐˜ข๐˜บ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ๐˜ด ๐˜ฐ๐˜ฏ ๐˜ฑ๐˜ฐ๐˜ฑ๐˜ถ๐˜ญ๐˜ข๐˜ณ ๐˜ด๐˜ช๐˜ต๐˜ฆ๐˜ด ๐˜ญ๐˜ช๐˜ฌ๐˜ฆ ๐˜ˆ๐˜ณ๐˜ด ๐˜›๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ค๐˜ข, ๐˜Ž๐˜ช๐˜ต๐˜๐˜ถ๐˜ฃ, ๐˜Ž๐˜ช๐˜ต๐˜“๐˜ข๐˜ฃ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜๐˜ช๐˜ฎ๐˜ฆ๐˜ฐ. ๐˜๐˜ฐ๐˜ธ๐˜ฆ๐˜ท๐˜ฆ๐˜ณ, ๐˜ฏ๐˜ฐ ๐˜ท๐˜ถ๐˜ญ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด ๐˜ธ๐˜ฆ๐˜ณ๐˜ฆ ๐˜ฆ๐˜น๐˜ฑ๐˜ญ๐˜ฐ๐˜ช๐˜ต๐˜ฆ๐˜ฅ ๐˜ธ๐˜ช๐˜ต๐˜ฉ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ๐˜ด๐˜ฆ ๐˜ด๐˜ช๐˜ต๐˜ฆ๐˜ด, ๐˜ฏ๐˜ฐ๐˜ณ ๐˜ธ๐˜ฆ๐˜ณ๐˜ฆ ๐˜ต๐˜ฉ๐˜ฆ๐˜บ ๐˜ฎ๐˜ช๐˜ด๐˜ค๐˜ฐ๐˜ฏ๐˜ง๐˜ช๐˜จ๐˜ถ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฆ๐˜ฏ๐˜ข๐˜ฃ๐˜ญ๐˜ฆ ๐˜ต๐˜ฉ๐˜ช๐˜ด ๐˜ข๐˜ฃ๐˜ถ๐˜ด๐˜ฆ.

๐˜๐˜ฏ ๐˜ช๐˜ต๐˜ด ๐˜ค๐˜ข๐˜ฎ๐˜ฑ๐˜ข๐˜ช๐˜จ๐˜ฏ, ๐˜œ๐˜•๐˜Š4990 ๐˜ถ๐˜ต๐˜ช๐˜ญ๐˜ช๐˜ป๐˜ฆ๐˜ด ๐˜ต๐˜ธ๐˜ฐ ๐˜ฌ๐˜ฆ๐˜บ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ต๐˜ฐ๐˜ฐ๐˜ญ๐˜ด, ๐˜Œ๐˜”๐˜—๐˜›๐˜ ๐˜š๐˜—๐˜ˆ๐˜Š๐˜Œ ๐˜ข๐˜ฏ๐˜ฅ ๐˜˜๐˜œ๐˜๐˜Œ๐˜›๐˜‰๐˜–๐˜ˆ๐˜™๐˜‹. ๐˜Œ๐˜”๐˜—๐˜›๐˜ ๐˜š๐˜—๐˜ˆ๐˜Š๐˜Œ, ๐˜ข๐˜ญ๐˜ด๐˜ฐ ๐˜ฌ๐˜ฏ๐˜ฐ๐˜ธ๐˜ฏ ๐˜ข๐˜ด ๐˜๐˜Œ๐˜›๐˜›๐˜ˆ ๐˜“๐˜ฐ๐˜ข๐˜ฅ๐˜ฆ๐˜ณ ๐˜ข๐˜ฏ๐˜ฅ ๐˜‰๐˜ณ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ณ๐˜“๐˜ฐ๐˜ข๐˜ฅ๐˜ฆ๐˜ณ, ๐˜ช๐˜ด ๐˜ข ๐˜ฅ๐˜ฐ๐˜ธ๐˜ฏ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ๐˜ฆ๐˜ณ ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ฅ๐˜ฆ๐˜ญ๐˜ช๐˜ท๐˜ฆ๐˜ณ๐˜ด ๐˜ข๐˜ฏ๐˜บ ๐˜ฑ๐˜ข๐˜บ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ ๐˜ด๐˜ฆ๐˜ณ๐˜ท๐˜ฆ๐˜ฅ ๐˜ฃ๐˜บ ๐˜ช๐˜ต๐˜ด ๐˜ค๐˜ฐ๐˜ฎ๐˜ฎ๐˜ข๐˜ฏ๐˜ฅ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ณ๐˜ฐ๐˜ญ ๐˜ด๐˜ฆ๐˜ณ๐˜ท๐˜ฆ๐˜ณ. ๐˜–๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฐ๐˜ต๐˜ฉ๐˜ฆ๐˜ณ ๐˜ฉ๐˜ข๐˜ฏ๐˜ฅ, ๐˜˜๐˜œ๐˜๐˜Œ๐˜›๐˜‰๐˜–๐˜ˆ๐˜™๐˜‹ ๐˜ช๐˜ด ๐˜ข ๐˜ฎ๐˜ถ๐˜ญ๐˜ต๐˜ช-๐˜ค๐˜ฐ๐˜ฎ๐˜ฑ๐˜ฐ๐˜ฏ๐˜ฆ๐˜ฏ๐˜ต ๐˜ฃ๐˜ข๐˜ค๐˜ฌ๐˜ฅ๐˜ฐ๐˜ฐ๐˜ณ ๐˜ค๐˜ข๐˜ฑ๐˜ข๐˜ฃ๐˜ญ๐˜ฆ ๐˜ฐ๐˜ง ๐˜ด๐˜ฆ๐˜ท๐˜ฆ๐˜ณ๐˜ข๐˜ญ ๐˜ง๐˜ถ๐˜ฏ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด, ๐˜ด๐˜ถ๐˜ค๐˜ฉ ๐˜ข๐˜ด ๐˜ข๐˜ณ๐˜ฃ๐˜ช๐˜ต๐˜ณ๐˜ข๐˜ณ๐˜บ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฎ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฆ๐˜น๐˜ฆ๐˜ค๐˜ถ๐˜ต๐˜ช๐˜ฐ๐˜ฏ, ๐˜ค๐˜ญ๐˜ช๐˜ฑ๐˜ฃ๐˜ฐ๐˜ข๐˜ณ๐˜ฅ ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ฆ๐˜ฏ๐˜ต ๐˜ฎ๐˜ข๐˜ฏ๐˜ช๐˜ฑ๐˜ถ๐˜ญ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ, ๐˜œ๐˜š๐˜‰/๐˜ณ๐˜ฆ๐˜ฎ๐˜ฐ๐˜ท๐˜ข๐˜ฃ๐˜ญ๐˜ฆ ๐˜ฅ๐˜ณ๐˜ช๐˜ท๐˜ฆ ๐˜ช๐˜ฏ๐˜ง๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ, ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ ๐˜ช๐˜ฏ๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜จ๐˜ข๐˜ต๐˜ฉ๐˜ฆ๐˜ณ๐˜ช๐˜ฏ๐˜จ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜Š2 ๐˜ค๐˜ฐ๐˜ฎ๐˜ฎ๐˜ถ๐˜ฏ๐˜ช๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ.

๐˜›๐˜ฉ๐˜ฆ ๐˜ช๐˜ฏ๐˜ง๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ญ๐˜ช๐˜ง๐˜ฆ๐˜ค๐˜บ๐˜ค๐˜ญ๐˜ฆ ๐˜ด๐˜ต๐˜ข๐˜ณ๐˜ต๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฅ๐˜ฐ๐˜ถ๐˜ฃ๐˜ญ๐˜ฆ-๐˜ค๐˜ญ๐˜ช๐˜ค๐˜ฌ๐˜ช๐˜ฏ๐˜จ ๐˜ฐ๐˜ง ๐˜ข ๐˜ฎ๐˜ข๐˜ญ๐˜ช๐˜ค๐˜ช๐˜ฐ๐˜ถ๐˜ด ๐˜“๐˜•๐˜’ ๐˜ด๐˜ฉ๐˜ฐ๐˜ณ๐˜ต๐˜ค๐˜ถ๐˜ต ๐˜ง๐˜ช๐˜ญ๐˜ฆ ๐˜ฐ๐˜ฏ ๐˜ข ๐˜ณ๐˜ฆ๐˜ฎ๐˜ฐ๐˜ท๐˜ข๐˜ฃ๐˜ญ๐˜ฆ ๐˜œ๐˜š๐˜‰ ๐˜ฅ๐˜ณ๐˜ช๐˜ท๐˜ฆ, ๐˜ธ๐˜ฉ๐˜ช๐˜ค๐˜ฉ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ฎ๐˜ฑ๐˜ต๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฆ๐˜น๐˜ฆ๐˜ค๐˜ถ๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ง ๐˜ข ๐˜—๐˜ฐ๐˜ธ๐˜ฆ๐˜ณ๐˜š๐˜ฉ๐˜ฆ๐˜ญ๐˜ญ ๐˜ด๐˜ค๐˜ณ๐˜ช๐˜ฑ๐˜ต ๐˜ฆ๐˜น๐˜ฑ๐˜ญ๐˜ฐ๐˜ณ๐˜ฆ๐˜ณ.๐˜ฑ๐˜ด1. ๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ด๐˜ค๐˜ณ๐˜ช๐˜ฑ๐˜ต ๐˜ด๐˜ถ๐˜ฃ๐˜ด๐˜ฆ๐˜ฒ๐˜ถ๐˜ฆ๐˜ฏ๐˜ต๐˜ญ๐˜บ ๐˜ฅ๐˜ฐ๐˜ธ๐˜ฏ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ๐˜ด ๐˜ข ๐˜ง๐˜ฐ๐˜ณ๐˜ต๐˜ฏ๐˜ช๐˜จ๐˜ฉ๐˜ต๐˜ญ๐˜บ ๐˜ฑ๐˜ข๐˜บ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ, ๐˜ต๐˜บ๐˜ฑ๐˜ช๐˜ค๐˜ข๐˜ญ๐˜ญ๐˜บ ๐˜ต๐˜ฉ๐˜ฆ ๐˜Œ๐˜”๐˜—๐˜›๐˜ ๐˜š๐˜—๐˜ˆ๐˜Š๐˜Œ ๐˜ฅ๐˜ฐ๐˜ธ๐˜ฏ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ๐˜ฆ๐˜ณ. ๐˜œ๐˜•๐˜Š4990 ๐˜ข๐˜ญ๐˜ด๐˜ฐ ๐˜ข๐˜ฅ๐˜ฆ๐˜ฑ๐˜ต๐˜ญ๐˜บ ๐˜ญ๐˜ฆ๐˜ท๐˜ฆ๐˜ณ๐˜ข๐˜จ๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ช๐˜ณ๐˜ฅ-๐˜ฑ๐˜ข๐˜ณ๐˜ต๐˜บ ๐˜ธ๐˜ฆ๐˜ฃ๐˜ด๐˜ช๐˜ต๐˜ฆ๐˜ด ๐˜ง๐˜ฐ๐˜ณ ๐˜ฑ๐˜ข๐˜บ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ ๐˜ฉ๐˜ฐ๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜จ.

๐Œ๐ข๐ง๐๐Œ๐š๐ฉ, ๐„๐ฑ๐ญ๐ซ๐š๐œ๐ญ๐ž๐ ๐ˆ๐Ž๐‚๐ฌ, ๐“๐“๐๐ฌ ๐ญ๐š๐›๐ฅ๐ž, ๐š๐ง๐ ๐“๐“๐๐ฌ ๐“๐ข๐ฆ๐ž๐ฅ๐ข๐ง๐ž ๐ข๐ง ๐ญ๐ก๐ž ๐Ÿ๐จ๐ฅ๐ฅ๐จ๐ฐ๐ข๐ง๐  ๐ข๐ฆ๐š๐ ๐ž๐ฌ

If you want to try it too: ti-mindmap-gpt.streamlit.app/

#timindmap #threatintelligence #ai #genai #openai #azureopenai #azure #llm

2024-02-09

๐‡๐จ๐ฐ ๐Œ๐ƒ๐“๐ˆ ๐‡๐ž๐ฅ๐ฉ๐ฌ ๐๐จ๐ฐ๐ž๐ซ ๐‚๐จ๐ฉ๐ข๐ฅ๐จ๐ญ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ

A critical aspect of any security analyst's work is keeping up to date with the latest developments in the threat landscape. Copilot for Security allows users to make simple requests known as prompts to learn about threat actors, tools, indicators of compromise (IoCs), and threat intelligence related to their organization's security incidents and alerts.

Below, are three important scenarios the MDTI plugin on Copilot for Security helps teams with:

โœ”The Reactive approach

โžก Emphasizes investigations and enhancing threat intelligence enrichment and additional context for the entities involved in the incident.

โœ”The Proactive approach

โžกEmphasizing the ability to detect and address threats targeting organizations like mine. It uses threat intelligence to prioritize incidents, trace possible intrusions, and expedite mitigation of misconfigurations and vulnerable software, while simultaneously assessing the organization's impact and posture against specific threats.

โœ”Keeping up with the latest threat intelligence Trends

โžกDetecting emerging threats by analyzing articles and trends, and subsequently disseminating relevant threat data.

techcommunity.microsoft.com/t5

#copilot #copilotforsecurity #securitycopilot #microsoftsecurity #microsoft #azure #cyber #cybersecurity #threatintellitence #ti #mdti #defender #defenderthreatintelligence #soc #investigation #cloudsecurity #ai #genai #generativeai #azureopenai #openai

2024-02-08

๐๐ž๐œ๐จ๐ฆ๐ž ๐š ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ ๐๐ข๐ง๐ฃ๐š

We collected content with multiple modules. We will keep updating this training on a regular basis.

Training content:

โžกModule 1- Getting started

โžกModule 2 โ€“ Portal Orientation

โžกModule 3 -Prioritization

โžกModule 4- Remediation

โžกModule 5 - Posture and Compliance

โžก Module 6 โ€“ Data access

techcommunity.microsoft.com/t5

#defender #xdr #vulnerability #management #vulnerabilitymanagement #microsoft #microsoftsecurity #soc #cve #azure #soc #mdvm #cyber #cybersecurity #tvm

2024-02-07

๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‚๐จ๐ฉ๐ข๐ฅ๐จ๐ญ: ๐ญ๐ก๐ž ๐š๐ซ๐ญ ๐จ๐Ÿ ๐ฉ๐ซ๐จ๐ฆ๐ฉ๐ญ๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐ž๐Ÿ๐Ÿ๐ข๐œ๐ข๐ž๐ง๐ญ ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ข๐ง๐ฏ๐ž๐ฌ๐ญ๐ข๐ ๐š๐ญ๐ข๐จ๐ง ๐ฌ๐ฎ๐ฆ๐ฆ๐š๐ซ๐ข๐ž๐ฌ

Security Copilot employs promptbooksโ€”a series of user-input-driven prompts that analyze cybersecurity threats. Every interaction within Security Copilot, be it an individual prompt or a promptbook, generates a session. These sessions, which are storable and shareable within your workspace.

Generating a summary within Security Copilot can vary in complexity and detail, influenced by how you craft your prompt.

More details:

techcommunity.microsoft.com/t5

#ai #genai #security #copilot #securitycopilot #microsoft #microsoftsecurity #azure #xdr #soc #llm #cybersecurity #prompt #prompting #promptengineering #promptbooks #securityincident #hunting #triage

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst