In this post I will show you some of my early attempts to try and productise what OpenAI can do to aid the work of Intelligence Analysts.
Blog
The Signals Corps blog
-
My early efforts to extract structured threat intelligence using OpenAI
Research March 20, 2023
-
Building cve2stix: Architecting as a cloud first service (part 6)
Products March 20, 2023
In this post I will show you the architecture of the hosted version of cve2stix.
-
Building cve2stix: Designing the API (part 5)
Products March 06, 2023
In this post I will show you the design decisions that went into building the cve2stix API (and why I didn’t choose TAXII).
-
Building cve2stix: Enriching NVD CVE data (part 4)
Products February 20, 2023
In this post I will show you how cve2stix enriches CVEs to provide additional context to each vulnerability.
-
Building cve2stix: Modelling NVD Data as STIX 2.1 Objects (part 3)
Products February 06, 2023
In this post I will show you how to use STIX 2.1 SDOs, SCOs, and SROs to standardised the way vulnerabilities are represented.
-
Building cve2stix: CPE and CVEs matching (part 2)
Products January 23, 2023
In this post I will show you how to analyse CPE combinations reported in CVEs to identify vulnerable products.
-
Building cve2stix: CPEs, CVEs, and the NVD APIs (part 1)
Products January 09, 2023
In this post I will introduce the important concepts of CVEs and CPEs and explain how to work with them using the NVD API.
-
STIX 2.1 109: Choosing a UUID version to generate STIX Object IDs
Tutorials Stix December 12, 2022
In this post I will explain the difference between UUID versions and which versions are best suited to different scenarios when modelling threat intelligence.
-
CACAO Playbooks 104: Authoring
Tutorials Cacao December 12, 2022
In this post I will show you how to create a Playbook from scratch.
-
CACAO Playbooks 103: Integrations
Tutorials Cacao November 28, 2022
In this post I will look at integrating CACAO playbooks into other products (MISP) and other standards (STIX 2.1).