<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cobalt Strike IPs and Application and Threat Updates in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cobalt-strike-ips-and-application-and-threat-updates/m-p/444776#M100392</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Minemeld is open source so you don't need to purchase Autofocus to use it. There are a range of in-built feeds , some of which require a licence others that do not.&lt;/P&gt;&lt;P&gt;A little off topic but Minemeld is also very good for dynamically managing O365 IP Addresses.&lt;/P&gt;</description>
    <pubDate>Mon, 01 Nov 2021 16:08:32 GMT</pubDate>
    <dc:creator>MichaelWrigh</dc:creator>
    <dc:date>2021-11-01T16:08:32Z</dc:date>
    <item>
      <title>Cobalt Strike IPs and Application and Threat Updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cobalt-strike-ips-and-application-and-threat-updates/m-p/444417#M100345</link>
      <description>&lt;P&gt;PAN provides anti-spyware signatures for&amp;nbsp;Cobalt Strike Payload Traffic Detection and Cobalt Strike Beacon Command and Control Traffic Detection that are automatically downloaded to our PAN firewall. I also use the four External Dynamic Lists that PAN provides to block known bad IPs. NJCCIC and MS-ISAC sometimes send me lists of known bad IPs that recently included Cobalt Strike IP addresses. Can anyone recommend how I can efficiently integrate this into our PAN firewalls?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Oct 2021 18:12:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cobalt-strike-ips-and-application-and-threat-updates/m-p/444417#M100345</guid>
      <dc:creator>NewProvidence</dc:creator>
      <dc:date>2021-10-29T18:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike IPs and Application and Threat Updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cobalt-strike-ips-and-application-and-threat-updates/m-p/444471#M100348</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/196711"&gt;@NewProvidence&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Kind of confused on what you are asking? If you just want an easy way to ingest NJCCIC and MS-ISAC indicators I would recommend setting up MineMeld and using it's API to feed in the indicators to a dedicated output node.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Oct 2021 22:19:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cobalt-strike-ips-and-application-and-threat-updates/m-p/444471#M100348</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-10-29T22:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike IPs and Application and Threat Updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cobalt-strike-ips-and-application-and-threat-updates/m-p/444762#M100388</link>
      <description>&lt;P&gt;MindMeld sounds like what I am looking for. Do I need to purchase AutoFocus to use MindMeld?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 15:21:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cobalt-strike-ips-and-application-and-threat-updates/m-p/444762#M100388</guid>
      <dc:creator>NewProvidence</dc:creator>
      <dc:date>2021-11-01T15:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike IPs and Application and Threat Updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cobalt-strike-ips-and-application-and-threat-updates/m-p/444776#M100392</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Minemeld is open source so you don't need to purchase Autofocus to use it. There are a range of in-built feeds , some of which require a licence others that do not.&lt;/P&gt;&lt;P&gt;A little off topic but Minemeld is also very good for dynamically managing O365 IP Addresses.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 16:08:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cobalt-strike-ips-and-application-and-threat-updates/m-p/444776#M100392</guid>
      <dc:creator>MichaelWrigh</dc:creator>
      <dc:date>2021-11-01T16:08:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike IPs and Application and Threat Updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cobalt-strike-ips-and-application-and-threat-updates/m-p/444799#M100394</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/196711"&gt;@NewProvidence&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62978"&gt;@MichaelWrigh&lt;/a&gt;&amp;nbsp;mentioned MineMeld itself is free. It was included with AutoFocus for a bit, but that's actually in the process of being end of lifed in favor of Cortex XSOAR's threat management solution.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The MineMeld docker image is still available with installation instructions available &lt;A href="https://web.archive.org/web/20210226224508/https://live.paloaltonetworks.com/t5/minemeld-articles/running-minemeld-using-docker/ta-p/289062" target="_self"&gt;HERE&lt;/A&gt;&amp;nbsp;or through MineMeld's primary &lt;A href="https://github.com/PaloAltoNetworks/minemeld" target="_self"&gt;Github repo&lt;/A&gt;&amp;nbsp;from source. Your use case you may also want to look at &lt;A href="https://gist.github.com/jtschichold/95f3906566b18b50cf2e3e1a44f1e785" target="_self"&gt;minemeld-sync.py&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 16:48:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cobalt-strike-ips-and-application-and-threat-updates/m-p/444799#M100394</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-11-01T16:48:17Z</dc:date>
    </item>
  </channel>
</rss>

