Fecha de publicación:
27/07/2023
Fuente: Noticias ICEX Lugar:
Threat Intelligence
Threat IntelligenceTrack Detection Rules Across the Web with Feedly AIAutomatically collect and download Sigma, Yara, Snort, and Microsoft hunting queries with Feedly AIMillions of security threats could potentially impact your business on any given day. Manual approaches to detection and prevention are only partial solutions at best. Advanced security teams attempt to automate the detection and prevention of malicious activities across their networks, systems, and applications using detection rules.You can now create customizable AI Feeds that scour the web (reports, blog posts, and GitHub repositories) for specific YARA, Sigma, Snort, or Hunting Queries. You can also download the detection rules you discover in one click (or via the API).Cybersecurity teams integrate these into their processes to automatically detect and hunt for new attacker behavior.Want to see how Feedly does it?Short video on using Feedly's Detection Rules AI Models to automate collection and sharingStart Free TrialNot familiar with Detection Rules? Skip to the Detection Rules Primer at the bottom of this post to learn more about the most common detection rules, including what they are and how they can be used to shore up your defenses.How Feedly can help collect and download detection rulesYou now have the power to identify potential threats faster and with minimal effort using Feedly AI. Our advanced Detection Rules AI Models allow you to stay informed of new detection rules showing up in blogs, articles, or the official repositories, so you can set up your defenses faster.We've also made it easy for you to collect and download the Sigma, YARA, Snort, and MS hunting query detection rules from various sources on the open web so you can use them in your security tooling.Here is an example of a customizable AI Feed that scours the Web for detection rules related to new emerging malware families.Feedly AI in action: Customize your AI Feeds to fit your intelligence needsCreate customized Detection Rules AI Feeds by pairing these new Detection Rules AI Models with keywords or 1000+ threat intelligence AI Models.Let’s say you want to track threat intelligence reports referencing Sigma rules:Select the Sigma Rules AI ModelClick on ‘AND’Add the Threat Intelligence Reports AI ModelCustomized AI Feed for Sigma rules in Threat Intelligence ReportsIf you need to discover articles referencing Snort Rules and MITRE ATT&CK TTPs:Select the Snort Rules AI ModelClick on ‘AND’Add the Tactics and Techniques AI ModelSnort rules and Tactics and TechniquesLooking for Microsoft hunting queries related to malware families?Select the Hunting Queries AI ModelClick on ‘AND’Add a malware family AI Model such as TrickBotAI Feed with Microsoft Hunting Querires and TrickBot malwareEasily export detection rules with one click to add your toolingWhen Feedly AI finds an article that contains a detection rule, the rule is featured at the top of the article, ready to be exported.Extracting Yara rules from an articleQuickly share your insights with your teamAll detection rules are also available via the Feedly API. This means that you can automatically extract detection rules to plug into your other platforms.Exported rules ready for uploading into your supporting security toolSpeed up your threat intelligence researchDetection Rules are only some of the machine learning models included in Feedly for Threat Intelligence. Start a free 30-day trial to improve the collection, analysis, and sharing of cyber threat intelligence.Start Free TrialDetection Rules PrimerWhat are detection rules?Security detection rules refer to specific patterns that aid in identifying and detecting possible security threats or incidents in a system, network, or application. These rules can be applied within different security tools or frameworks to create automated responses when specific patterns are identified.What are some detection rules types?Detection rules can be used for Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), classifying malware, or analyzing logs. Let’s look at some of the more common types.Snort is an open-source intrusion detection and prevention system (IDS/IPS) that uses a rule-based approach to detect and prevent network-based attacks. Snort rules define the conditions and patterns that Snort uses to identify and respond to potential security threats within network traffic. While Snort rules only work with Snort’s IDS/IPS, they can be incorporated into other IDS/IPS systems you may be using.YARA provides a rule-based approach to describe the contents of malicious files. A description is essentially a YARA rule name, where these rules consist of sets of strings and a boolean expression. YARA can run on Windows, Linux and macOS, and can be accessed through its command-line interface or from various vendor-provided tools.Sigma is an open signature format that allows you to describe relevant log events in a straightforward manner. As the format is generic, Sigma rules enable security defenders to use a common language to share rules and then convert them to their SIEM-specific rules. In addition to vendor-specific tools, Sigma rules can be shared with the open-source MISP threat intelligence sharing platform.Hunting queries are proprietary to Microsoft Defender and Sentinel, though they may be inspired by Sigma rules. Hunting queries are written in the Kusto Query Language (KQL) and can be used to review logs for unusual activity, detect possible threats, and respond to attacks. They can also be used to look for processes running or ports open on endpoints that could represent weaknesses in the attack surface.Collecting detection rulesHow do you collect and create detection rules that you can use in your tools? You can start with the GitHub repositories for Sigma or Yara or go to Snort.org, where you can find hundreds or thousands of rules that people have contributed. For Microsoft’s hunting queries, there is a repository on GitHub for both Defender and Sentinel.However, keep in mind that when individuals create their own detection rules, they might not share them with the aforementioned repositories, and even if they do, there is often a delay in getting the pull requests approved, causing them to officially be added. In addition, detection rules are often published in open-source articles outside of these repositories and are difficult and time-consuming to monitor.Fortunately, Feedly can help you automatically collect and share detection rules. Interested in trying out Feedly’s detection rules? Request a trial of Feedly for Threat Intelligence.