We are excited to announce an expanded set of XSOAR playbooks that make use of Digital Shadows intelligence. In this blog, I’ll outline some of the most popular use cases our customers are using to streamline investigation and correlate intelligence across multiple tools.
Save time and resources with Digital Shadows XSOAR playbooks
With limited resources available to security teams, automating investigation is key to reducing time to response. Finding ways to automate repetitive, error-prone tasks and ensure the proper actions are taken each and every time is critical in a fast-moving security landscape.
XSOAR playbooks enable security teams to enrich alerts with Digital Shadows data, and trigger workflows for responding to SearchLight alerts.
Enrich observables with Digital Shadows data
Every security team will have dozens of products providing alerts and indicators that need to be investigated. SearchLight can be used to automatically enrich those which require investigation, further reducing the investigation time for your teams.
We have built playbooks that will take IP Address, CVE, Domain, URL and Hash indicators. These will enable users to understand where the observable has been linked to Digital Shadows intelligence updates. Any associated MITRE techniques, associated indicators, and summary information are added to the incident.
This enrichment includes the ability to look up reported domains, as shown below.
Enrich CVEs with Vulnerability Intelligence
Users can enrich CVEs by adding CVSS details and vulnerability intelligence. This will query Digital Shadows’ intelligence repository, retrieving threat actor profiles linked to the CVE including links to MITRE techniques. In addition, users can query volume of mentions of the CVE across criminal, dark web and other malicious sources.
Following our Vulnerability Intelligence module announcement, we plan to release new XSOAR playbooks to automatically prioritize CVEs from scanning tools. This will be based on an Intelligence led approach, prioritizing those CVEs which are being actively discussed and exploited by threat groups.
Trigger responses to Digital Shadows alerts
Using the SearchLight platform, you can view a wide range of associated data for impersonating domains, phishing pages, and exposed credentials. For our customers who want to extract this data into XSOAR to build automation workflows, our enrichment playbooks provide intelligence and reputation outputs to the client via the XSOAR dashboard.
We see our customers responding in a range of ways, including automating password resets, domain blocking, and automatically emailing impacted users.
Support from our Professional Services Team
Our Professional Services team are available to assist in the creation of bespoke playbooks and commands, or customizations of our predefined playbooks in order to support your risk triage or threat intelligence use-cases.
Get in touch today to learn how we can help!