From 918f18ee912871537f3b619dff184176c936aaa3 Mon Sep 17 00:00:00 2001 From: Andras Iklody Date: Mon, 30 Jan 2023 11:21:41 +0100 Subject: [PATCH] fix: [README.md] typo fixed testing mail filters further --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index cbd03aa13..193fd8f91 100644 --- a/README.md +++ b/README.md @@ -52,7 +52,7 @@ MISP, Malware Information Sharing Platform and Threat Sharing, core functionalit - Flexible **free text import** tool to ease the integration of unstructured reports into MISP. - A gentle system to **collaborate** on events and attributes allowing MISP users to propose changes or updates to attributes/indicators. - **data-sharing**: automatically exchange and synchronize with other parties and trust-groups using MISP. -- **delegating of sharing**: allows a simple pseudo-anonymous mechanism to delegate publication of event/indicators to another organization. +- **delegating of sharing**: allows for a simple, pseudo-anonymous mechanism to delegate publication of event/indicators to another organization. - Flexible **API** to integrate MISP with your own solutions. MISP is bundled with [PyMISP](https://github.com/MISP/PyMISP) which is a flexible Python Library to fetch, add or update events attributes, handle malware samples or search for attributes. An exhaustive restSearch API to easily search for indicators in MISP and exports those in all the format supported by MISP. - **Adjustable taxonomy** to classify and tag events following your own classification schemes or [existing classification](https://github.com/MISP/misp-taxonomies). The taxonomy can be local to your MISP but also shareable among MISP instances. - **Intelligence vocabularies** called MISP galaxy and bundled with existing [threat actors, malware, RAT, ransomware or MITRE ATT&CK](https://www.misp-project.org/galaxy.html) which can be easily linked with events and attributes in MISP.