Skip to main content

Cyware Threat Intelligence eXchange

Release Notes 3.7.1 (Early Access)

April 8, 2025

We are excited to introduce you to the latest version of Intel Exchange v3.7.1.0 (EA). This is a limited-availability release that includes new features, enhancements, and bug fixes.

Traffic Light Protocol (TLP) Version 2.0 New

Intel Exchange now fully supports TLP version 2.0, in line with the latest data marking standards for threat intel. By default, all TLP 1.0 markings are automatically converted to TLP 2.0.

The platform's UI, dashboards, and rule conditions have been upgraded to reflect the new TLP 2.0 markings. Additionally, you can choose between TLP 1.0 and 2.0 for data export and third-party integrations, ensuring enhanced compliance and flexibility across the platform.

For more information, see Configure General Settings.

Sightings New

Intel Exchange now includes a feature to capture Sighting Relationship Objects (SROs) linked to threat data objects. The new Sightings tab offers detailed listings, including sources, first seen, last seen, and sighting count, enabling analysts to assess the object and its context directly within the Threat Data object details page.

ctix-sightings.png

For more information, see Sightings.

Automatic TLP Detection from Email Content New

Intel Exchange now features an advanced capability to automatically detect Traffic Light Protocol (TLP) markings from the email subject and body in the Threat Mailbox. While creating intel from emails, the detected TLP marking is automatically assigned to the intel, ensuring accurate and consistent data classification without the need for manual input.

For more information, see Create Intel from Threat Mailbox.

AI-Assist New

AI Assist streamlines threat intelligence workflows by automating data extraction and analysis, reducing manual effort, and improving data accuracy. This enables faster threat identification and informed decision-making.

  • AI Assist-Enabled Parsing: Automates threat data extraction from ingested sources, minimizing input errors and ensuring consistency. This improves data processing speed and allows analysts to focus on high-priority tasks.

  • AI-Generated Analyst Descriptions: Uses AI to generate concise, context-aware summaries of threat data, ensuring uniform documentation and enabling faster, more reliable threat assessments.

ctix-ai-assist.png

For more information, see  Generate Analyst Description using AI Assist.

X (Twitter) Feed Source New

Intel Exchange now supports X (Twitter) as a feed source. This helps you monitor and analyze real-time threat intel directly from X, capturing insights from a vast and dynamic source of data. 

For more information, see X (Twitter) Feeds.

TAXII Servers Enhanced

The TAXII Server settings in Intel Exchange are enhanced to include the following updates:

  • You can now configure limits on the number of API requests that subscribers make per minute, hour, and day. This update helps prevent potential server overloads and ensures compliance with the allocated API quota, maintaining stable performance and availability. For more information, see Configure TAXII Preferences.

  • Improve security by uploading certificates from trusted certificate authorities to ensure enhanced authentication for subscribers. This adds an additional layer of security, reducing the risk of unauthorized access. For more information, see Add Subscribers Manually in CTIX.

Rules Enhanced

The following actions are now supported while creating rules in Intel Exchange:

  • Create CFTR Incident: You can now configure rules to create incidents in CFTR from report objects, enabling automated incident generation based on the specified criteria.

  • Update Custom Score: You can now update the custom score values of objects using rules, allowing for the automatic adjustment of scores based on evolving threat intelligence.

For more information, see Automation Rules.

Threat Data Enhanced

The following enhancements are now available in Threat Data:

  • You can now export custom scores as part of custom attributes while exporting threat data objects, ensuring all relevant metrics are preserved for external analysis or reporting.

  • The Threat Data Timeline now displays the creator and source of objects, improving transparency in threat data management. For non-indicator objects, the timeline captures manual actions performed.

    Additionally, updates like TLP changes, privileged tags, and custom score adjustments are now logged, providing comprehensive tracking and accountability for all critical changes. These enhancements enable you to effectively review changes to threat data objects.

  • You can now revoke threat data objects identified as erroneous or outdated threat intelligence, ensuring that only accurate and relevant data is retained. This option is supported for all object types except custom objects, observables, and incidents. For more information, see Action on Threat Data Objects.

  • You can now redirect to the source Threat Investigation canvas directly from the Threat Data object details page, allowing for seamless access to the investigation context and facilitating efficient analysis.

  • The Actions Taken tab now features improved error handling for third-party actions with a new Status column. This column displays values such as Success, Failed, Timeout, and Unknown. It also includes detailed status codes and copyable JSON responses. Connection error notifications alert users of failures, enhancing troubleshooting and user experience.

  • Intel Exchange now supports the automatic conversion of Markdown to HTML in object descriptions, ensuring that detailed reports and IOCs from feed providers are displayed in a readable format. This enhancement improves the clarity and presentation of descriptions in the Basic Details tab.

Other Enhancements

  • In Rules, a new option Trigger on Deprecate is now introduced, which automatically runs the configured action associated with a threat intel object after it is deprecated. This ensures that object data is up-to-date without manual effort.

  • Custom scores can now be disabled and hidden from the UI, search, and CQL. Disabled scores are no longer editable but can be re-enabled, restoring their visibility and associations with historical threat data. Additionally, audit logs now capture custom score activities, including status changes. For more information, see Configure Custom Scores.

  • While creating intel from RSS feeds, the source description of the intel now includes a link to the source RSS article, ensuring easy access to the original content.

  • In Threat Investigations, you can now enrich a node using multiple enrichment tools, enhancing the overall user experience.