mirror of https://github.com/MISP/misp-website
fix: [all] fixes broken links
parent
dda5324749
commit
5422361f1a
|
@ -23,7 +23,7 @@ A threat intelligence platform for sharing, storing and correlating Indicators o
|
||||||
* **delegating of sharing**: allows a simple pseudo-anonymous mechanism to delegate publication of event/indicators to another organization.
|
* **delegating of sharing**: allows a simple pseudo-anonymous mechanism to delegate publication of event/indicators to another organization.
|
||||||
* Flexible **API** to integrate MISP with your own solutions. MISP is bundled with [PyMISP](https://github.com/MISP/PyMISP) which is a flexible Python Library to fetch, add or update events attributes, handle malware samples or search for attributes.
|
* Flexible **API** to integrate MISP with your own solutions. MISP is bundled with [PyMISP](https://github.com/MISP/PyMISP) which is a flexible Python Library to fetch, add or update events attributes, handle malware samples or search for attributes.
|
||||||
* **adjustable taxonomy** to classify and tag events following your own classification schemes or [existing taxonomies](https://github.com/MISP/misp-taxonomies). The taxonomy can be local to your MISP but also shareable among MISP instances. MISP comes with a default set of well-known [taxonomies and classification schemes](/taxonomies.html) to support standard classification as used by ENISA, Europol, DHS, CSIRTs or many other organisations.
|
* **adjustable taxonomy** to classify and tag events following your own classification schemes or [existing taxonomies](https://github.com/MISP/misp-taxonomies). The taxonomy can be local to your MISP but also shareable among MISP instances. MISP comes with a default set of well-known [taxonomies and classification schemes](/taxonomies.html) to support standard classification as used by ENISA, Europol, DHS, CSIRTs or many other organisations.
|
||||||
* **intelligence vocabularies** called MISP galaxy and bundled with existing [threat actors, malware, RAT, ransomware or MITRE ATT&CK](galaxy.html) which can be easily linked with events in MISP.
|
* **intelligence vocabularies** called MISP galaxy and bundled with existing [threat actors, malware, RAT, ransomware or MITRE ATT&CK](/galaxy.html) which can be easily linked with events in MISP.
|
||||||
* **[expansion modules](https://misp.github.io/misp-modules/) in Python** to expand MISP with your own services or activate already available [misp-modules](https://github.com/MISP/misp-modules).
|
* **[expansion modules](https://misp.github.io/misp-modules/) in Python** to expand MISP with your own services or activate already available [misp-modules](https://github.com/MISP/misp-modules).
|
||||||
* **sighting support** to get observations from organizations concerning shared indicators and attributes. Sighting [can be contributed](https://www.circl.lu/doc/misp/automation/index.html#sightings-api) via MISP user-interface, API as MISP document or STIX sighting documents. Starting with MISP 2.4.66, [Sighting has been extended](/2017/02/16/Sighting-The-Next-Level.html) to support false-negative sighting or expiration sighting.
|
* **sighting support** to get observations from organizations concerning shared indicators and attributes. Sighting [can be contributed](https://www.circl.lu/doc/misp/automation/index.html#sightings-api) via MISP user-interface, API as MISP document or STIX sighting documents. Starting with MISP 2.4.66, [Sighting has been extended](/2017/02/16/Sighting-The-Next-Level.html) to support false-negative sighting or expiration sighting.
|
||||||
* **STIX support**: export data in the STIX format (XML and JSON) including export/import in STIX 2.0 format.
|
* **STIX support**: export data in the STIX format (XML and JSON) including export/import in STIX 2.0 format.
|
||||||
|
|
|
@ -7,7 +7,7 @@ toc: true
|
||||||
|
|
||||||
## Announcements and press releases
|
## Announcements and press releases
|
||||||
|
|
||||||
The general purpose announcements that we publish are available on the [news page](/news/).
|
The general purpose announcements that we publish are available on the [news page](/blog/).
|
||||||
Write us an email at <info@misp-project.org> if you have a press inquiry.
|
Write us an email at <info@misp-project.org> if you have a press inquiry.
|
||||||
You can also send press articles about MISP to this address, so we can add them to this page.
|
You can also send press articles about MISP to this address, so we can add them to this page.
|
||||||
|
|
||||||
|
|
|
@ -2,4 +2,4 @@ name: "MISP Docu & Trainings"
|
||||||
position: ""
|
position: ""
|
||||||
avatar: "img/testimonials/book.png"
|
avatar: "img/testimonials/book.png"
|
||||||
text: "In a continuous effort since 2016, [CIRCL](https://www.circl.lu) frequently gives practical training sessions about MISP. The purpose is to reach out to security analysts using MISP as a threat intelligence platform along with users using it as an information sharing platform.\n\n
|
text: "In a continuous effort since 2016, [CIRCL](https://www.circl.lu) frequently gives practical training sessions about MISP. The purpose is to reach out to security analysts using MISP as a threat intelligence platform along with users using it as an information sharing platform.\n\n
|
||||||
All the [training materials]([https://github.com/MISP/misp-training) are open source, include slides and a virtual machine preconfigured with the latest version of MISP. [Reach out](professional-services) if you are looking for custom training."
|
All the [training materials](https://github.com/MISP/misp-training) are open source, include slides and a virtual machine preconfigured with the latest version of MISP. [Reach out](professional-services) if you are looking for custom training."
|
||||||
|
|
Binary file not shown.
Loading…
Reference in New Issue