<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: A question from the Malware Pack v2 webinar: Misclassification rate in Cortex XSOAR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/a-question-from-the-malware-pack-v2-webinar-misclassification/m-p/523503#M1502</link>
    <description>&lt;P&gt;&lt;SPAN&gt;A reply by:&amp;nbsp;@ssokolovich &amp;amp; &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163552"&gt;@bkatzir&lt;/a&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The investigation flow is not only relying on sandbox/VT information but also on additional activities that occurred in the environment, such as additional alerts, hunting queries, etc. Moreover, all this information is populated to the incident layout for the analyst to review before determining if the alert is False/True positive.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Dec 2022 15:59:01 GMT</pubDate>
    <dc:creator>rtsedaka</dc:creator>
    <dc:date>2022-12-07T15:59:01Z</dc:date>
    <item>
      <title>A question from the Malware Pack v2 webinar: Misclassification rate</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/a-question-from-the-malware-pack-v2-webinar-misclassification/m-p/523502#M1501</link>
      <description>&lt;P&gt;&lt;SPAN&gt;How do you address the extremely high misclassification rate of both file detonation (any semi-sophisticated malware won't divulge any information in a sandbox) as well as the high misclassification by Virustotal (both FP and TP)?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Note: This question was asked as part of &lt;A id="link_9" class="page-link lia-link-navigation lia-custom-event" href="https://live.paloaltonetworks.com/t5/customer-success-webinars/cortex-xsoar-customer-success-webinar-malware-investigation-amp/ta-p/523004" target="_blank"&gt;Cortex XSOAR Customer Success Webinar: Malware Investigation &amp;amp; Response V2&amp;nbsp;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 15:56:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/a-question-from-the-malware-pack-v2-webinar-misclassification/m-p/523502#M1501</guid>
      <dc:creator>rtsedaka</dc:creator>
      <dc:date>2022-12-07T15:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: A question from the Malware Pack v2 webinar: Misclassification rate</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/a-question-from-the-malware-pack-v2-webinar-misclassification/m-p/523503#M1502</link>
      <description>&lt;P&gt;&lt;SPAN&gt;A reply by:&amp;nbsp;@ssokolovich &amp;amp; &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163552"&gt;@bkatzir&lt;/a&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The investigation flow is not only relying on sandbox/VT information but also on additional activities that occurred in the environment, such as additional alerts, hunting queries, etc. Moreover, all this information is populated to the incident layout for the analyst to review before determining if the alert is False/True positive.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 15:59:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/a-question-from-the-malware-pack-v2-webinar-misclassification/m-p/523503#M1502</guid>
      <dc:creator>rtsedaka</dc:creator>
      <dc:date>2022-12-07T15:59:01Z</dc:date>
    </item>
  </channel>
</rss>

