Latest news with #MISP


Nikkei Asia
24-06-2025
- Nikkei Asia
Japan teams with NATO to counter China, Russia cyber threats
Japan's participation in the Malware Information Sharing Platform will signal it is focused on cyberdefense. (Photo by Suzu Takahashi) SHINNOSUKE NAGATOMI TOKYO -- Japan has begun sharing intelligence related to cyberattacks with NATO member countries, Nikkei has learned, exchanging information about malware used by China, North Korea, Russia and other countries with the aim of improving cyberdefense. Japan's Defense Ministry and Self-Defense Forces have joined NATO's Malware Information Sharing Platform (MISP), a framework created in 2013. South Korea also participates as a non-NATO member.


Arabian Post
12-06-2025
- Business
- Arabian Post
Open‑Source SOC Tools Offer Scalable, Customisable Cyber Defence
Organisations grappling with escalating cyber threats are increasingly turning to open‑source Security Operations Center tools to establish proactive, cost‑effective defences. These solutions deliver SIEM, threat detection, incident response, and network monitoring capabilities while offering transparency, flexibility, and community‑driven innovation. Open‑source SOC platforms such as Security Onion, Wazuh, Graylog Open, TheHive and MISP form a modular toolkit that security teams can tailor to specific environments. Security Onion provides signature‑based detection, packet capture and threat‑hunting honeypots via APIs and agents. Wazuh integrates XDR and SIEM into a single agent supporting endpoint protection, cloud workload monitoring, log analysis and regulatory compliance. Graylog Open excels at ingesting and correlating logs from diverse sources and containerised systems. TheHive and MISP enable threat intelligence sharing and coordinated incident response workflows. These tools collectively lower barriers to entry by eliminating licence fees and vendor lock‑in while enabling fine‑tuned deployments. Organisations benefit from full visibility into system internals—something proprietary solutions often obscure. Development under open‑source licences fosters rapid iteration, driven by both corporate contributors and independent community members. This broad, peer‑reviewed ecosystem helps detect and patch vulnerabilities quickly, reducing costs and increasing stability. ADVERTISEMENT Security teams have successfully deployed open‑source SOCs at scale. Wazuh protects millions of endpoints worldwide, delivering real‑time correlation, threat hunting and endpoint recovery without high‑cost solutions. Security Onion supports multi‑tenant architectures, allowing IT and SOC teams to collaborate seamlessly across shared environments. MISP and similar platforms empower managed security service providers to offer threat‑intelligence feeds and collaborative defence strategies to clients. Industry analysts emphasise that open‑source tools often outperform commercial alternatives in adaptability and feature depth. Aikido Zen notes that transparency compels open‑source solutions to exceed expectations, driving 'deeper features and value' than closed‑source offerings. The open‑source model encourages organisations to contribute enhancements and custom modules, thereby strengthening the ecosystem as a whole. Challenges remain. Effective deployment demands in‑house expertise to configure integrations, tune detection rules, and maintain community‑based support channels. Small organisations may prefer SOC‑as‑a‑Service or managed SOC options to mitigate complexity. Cybersecurity specialists warn that open‑source alone is not a panacea; tools must be deployed strategically with robust processes and ongoing oversight. Despite these hurdles, the momentum behind open‑source SOC frameworks is undeniable. Adoption is rising among enterprises seeking agile, transparent defences aligned with zero‑trust initiatives and compliance mandates. The modular nature of these platforms allows teams to start with core capabilities—log aggregation, threat monitoring, incident management—and incrementally enhance their security posture. Security Onion, Wazuh and Graylog offer the foundational building blocks to establish monitoring pipelines, with TheHive and MISP orchestrating cross‑team collaboration and intelligence sharing. Combined, they offer enterprises a flexible alternative to expensive, vendor‑locked systems. Organisations that invest in talent and integration can build SOC environments that rival proprietary solutions in performance while enabling full customisation and community collaboration. As threat actors evolve, the adaptability of open‑source SOC tools positions them as a sustainable choice—balancing transparency, effectiveness and cost‑efficiency.