Skip to main content

Cyware Threat Intelligence eXchange

CyberInt

Connector Category: Enrichment Tool

About Integration

This integration with CyberInt enables you to leverage the latest open, deep, and dark web intelligence within Intel Exchange for proactive external risk protection. This enrichment tool empowers security teams with intelligent automation and scaled threat hunting capabilities, helping to swiftly identify and mitigate external threats through enriched insights from CyberInt’s intelligence sources.

Configure CyberInt as an Enrichment Tool

Configure CyberInt in Intel Exchange to enrich vulnerabilities, hashes, IP addresses, domains and URLs.

Before you Start

  • Ensure that you have the base URL and API token of your CyberInt account.

  • Ensure that your user group has Create, Update, and View permissions for enrichment tools and their associated policies in Intel Exchange.

    Note

    Ensure that the API key includes the permissions to retrieve hash, IP addresses, domains, and URLs.

Steps 

To configure CyberInt as an enrichment tool in Intel Exchange, follow these steps:

  1. Sign in to Intel Exchange and go to Administration > Enrichment Management > Enrichment Tools.

  2. Search and select the CyberInt enrichment tool.

  3. Click Add Account and enter the following details:

    • Account Name: Enter a unique account name to identify the instance. For example, CyberInt Prod.

    • Base URL: Enter the base URL of your CyberInt instance. The default base URL is TO BE Added.

    • API Key: Enter the API key of your CyberInt account to authenticate communication between Intel Exchange and CyberInt servers.

    • Verify SSL: Enable this option to validate the SSL certificate and secure the connection between Intel Exchange and CyberInt servers. This option is enabled by default.

      Note

      Cyware recommends you select Verify SSL. If you disable this option, Intel Exchange may configure an instance for an expired SSL certificate. This may not establish the connection properly and Intel Exchange will not be able to notify you in case of a broken or improper connection.

  4. Click Save.

After successfully adding an account, you can view and enable CyberInt feed enrichment types. You can also configure a quota to set a limit on the number of enrichment requests the CyberInt account can make. Once the quota is exhausted, no further enrichment requests can be made until the quota resets for the next quota duration. For more details, refer to Define Quota in Configure Enrichment Tools

To understand the number of API calls and quota units consumed by the CyberInt enrichment tool per polling, refer to the following table.

Enrichment Tool

Feed Enrichment Type

No. of API calls

Quota Consumed

CyberInt

Retrieve Hash Detail (sha256)

1

1

Retrieve IP Address Detail

1

1

Retrieve Vulnerability Detail

1

1

Retrieve URL Detail

1

1

Retrieve Domain Detail

1

1

You can configure an enrichment policy to automatically enrich threat data objects using the CyberInt enrichment tool. For more information, refer to Enrichment Policy.