New Blog Post | MSTICPy January 2022 hackathon highlights

%3CLINGO-SUB%20id%3D%22lingo-sub-3222390%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20MSTICPy%20January%202022%20hackathon%20highlights%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3222390%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2022%2F02%2F25%2Fmsticpy-january-2022-hackathon-highlights%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMSTICPy%20January%202022%20hackathon%20highlights%20-%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EDuring%20the%20month%20of%20January%202022%2C%20the%20Microsoft%20Threat%20Intelligence%20Center%20(MSTIC)%20ran%20its%20inaugural%20hackathon%20for%20the%20open-source%20Jupyter%20and%20Python%20Security%20Tools%20library%2C%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fmsticpy.readthedocs.io%2Fen%2Flatest%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EMSTICPy%3C%2FA%3E.%20We%20asked%20the%20security%20community%20for%20their%20contributions%20to%20expand%20and%20improve%20MSTICPy%E2%80%99s%20features%20and%20capabilities%2C%20and%20we%20helped%20contributors%20shape%20and%20deliver%20their%20contributions.%20As%20MSTICPy%20is%20an%20open-source%20project%2C%20contributions%20from%20the%20community%20are%20highly%20valued%20and%20help%20to%20make%20the%20tools%20useful%20and%20effective.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20response%20from%20the%20community%20was%20fantastic%2C%20with%20engagement%20and%20discussions%20on%20the%20future%20design%20and%20direction%20of%20MSTICPy%2C%20and%20many%20awesome%20contributions%20that%20ranged%20from%20updated%20documentation%20to%20completely%20new%20features.%20We%20are%20incredibly%20grateful%20for%20everyone%E2%80%99s%20engagement%20and%20wanted%20to%20take%20a%20moment%20to%20highlight%20some%20of%20the%20contributions%20and%20extend%20our%20sincere%20thanks%20to%20the%20authors.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3ESome%20of%20these%20contributions%20are%20already%20released%20in%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fmicrosoft%2Fmsticpy%2Freleases%2Ftag%2Fv1.6.1%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%22%3EMSTICPy%201.6.1%3C%2FA%3E%2C%20while%20most%20of%20the%20remaining%20items%20will%20make%20it%20into%20version%201.7.0%2C%20to%20be%20released%20in%20late%20February%202022.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3222390%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

WIN22_HybridWork_027-617341864162b-900x360.jpg

MSTICPy January 2022 hackathon highlights - Microsoft Security Blog

During the month of January 2022, the Microsoft Threat Intelligence Center (MSTIC) ran its inaugural hackathon for the open-source Jupyter and Python Security Tools library, MSTICPy. We asked the security community for their contributions to expand and improve MSTICPy’s features and capabilities, and we helped contributors shape and deliver their contributions. As MSTICPy is an open-source project, contributions from the community are highly valued and help to make the tools useful and effective. 

 

The response from the community was fantastic, with engagement and discussions on the future design and direction of MSTICPy, and many awesome contributions that ranged from updated documentation to completely new features. We are incredibly grateful for everyone’s engagement and wanted to take a moment to highlight some of the contributions and extend our sincere thanks to the authors. 

 

Some of these contributions are already released in MSTICPy 1.6.1, while most of the remaining items will make it into version 1.7.0, to be released in late February 2022. 

0 Replies