Digital Shadows is now a ReliaQuest Company
Company / Automate Alert Investigation and Response with XSOAR and SearchLight

Automate Alert Investigation and Response with XSOAR and SearchLight

Automate Alert Investigation and Response with XSOAR and SearchLight
James Merrick
Read More From James Merrick
February 11, 2022 | 3 Min Read

We are excited to announce an expanded set of XSOAR playbooks that make use of Digital Shadows intelligence. In this blog, I’ll outline some of the most popular use cases our customers are using to streamline investigation and correlate intelligence across multiple tools. 

Save time and resources with Digital Shadows XSOAR playbooks

With limited resources available to security teams, automating investigation is key to reducing time to response. Finding ways to automate repetitive, error-prone tasks and ensure the proper actions are taken each and every time is critical in a fast-moving security landscape.

XSOAR playbooks enable security teams to enrich alerts with Digital Shadows data, and trigger workflows for responding to SearchLight alerts.

Enrich observables with Digital Shadows data

Every security team will have dozens of products providing alerts and indicators that need to be investigated. SearchLight can be used to automatically enrich those which require investigation, further reducing the investigation time for your teams.

We have built playbooks that will take IP Address, CVE, Domain, URL and Hash indicators. These will enable users to understand where the observable has been linked to Digital Shadows intelligence updates. Any associated MITRE techniques, associated indicators, and summary information are added to the incident.

This enrichment includes the ability to look up reported domains, as shown below. 

Enrich CVEs with Vulnerability Intelligence

Users can enrich CVEs by adding CVSS details and vulnerability intelligence. This will query Digital Shadows’ intelligence repository, retrieving threat actor profiles linked to the CVE including links to MITRE techniques. In addition, users can query volume of mentions of the CVE across criminal, dark web and other malicious sources. 

Following our Vulnerability Intelligence module announcement, we plan to release new XSOAR playbooks to automatically prioritize CVEs from scanning tools. This will be based on an Intelligence led approach, prioritizing those CVEs which are being actively discussed and exploited by threat groups.

Trigger responses to Digital Shadows alerts 

Using the SearchLight platform, you can view a wide range of associated data for impersonating domains, phishing pages, and exposed credentials. For our customers who want to extract this data into XSOAR to build automation workflows, our enrichment playbooks provide intelligence and reputation outputs to the client via the XSOAR dashboard. 

We see our customers responding in a range of ways, including automating password resets, domain blocking, and automatically emailing impacted users.

Support from our Professional Services Team

Our Professional Services team are available to assist in the creation of bespoke playbooks and commands, or customizations of our predefined playbooks in order to support your risk triage or threat intelligence use-cases.

Get in touch today to learn how we can help!

Tags:

Related Blog Posts

Stop the line: Cyber threats facing manufacturing

Stop the line: Cyber threats facing manufacturing

August 17, 2022 | 8 Min Read

The cyber risk facing the manufacturing sector...
Meet DUMPS Forum: A pro-Ukraine, anti-Russia cybercriminal forum

Meet DUMPS Forum: A pro-Ukraine, anti-Russia cybercriminal forum

August 10, 2022 | 8 Min Read

While the Russian invasion of Ukraine has...
ReliaQuest and Digital Shadows – The Next Stage of the Journey

ReliaQuest and Digital Shadows – The Next Stage of the Journey

August 3, 2022 | 3 Min Read

We are pleased to announce that the acquisition...