<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Syed Ali</title>
    <description>The latest articles on Forem by Syed Ali (@greykaizen).</description>
    <link>https://forem.com/greykaizen</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3485252%2Fb7f714aa-4348-4b4a-8f3b-26a8ffe6aa96.png</url>
      <title>Forem: Syed Ali</title>
      <link>https://forem.com/greykaizen</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/greykaizen"/>
    <language>en</language>
    <item>
      <title>Threat Intelligence Feeds Are Broken — And We’re Fixing the Trust Problem No One Talks About</title>
      <dc:creator>Syed Ali</dc:creator>
      <pubDate>Sat, 04 Oct 2025 07:31:56 +0000</pubDate>
      <link>https://forem.com/greykaizen/threat-intelligence-feeds-are-broken-and-were-fixing-the-trust-problem-no-one-talks-about-2eba</link>
      <guid>https://forem.com/greykaizen/threat-intelligence-feeds-are-broken-and-were-fixing-the-trust-problem-no-one-talks-about-2eba</guid>
      <description>&lt;p&gt;Every SOC analyst knows this moment: an alert fires at 3 AM, triggered by some IOC from some feed you don’t quite remember subscribing to. You’re half-awake, staring at an IP address thinking — &lt;em&gt;Is this real or is this another false positive waiting to waste my night?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;We’ve built impressive pipelines for &lt;em&gt;sharing&lt;/em&gt; threat intelligence — STIX, TAXII, MISP, OpenCTI, vendor CSVs (because of course someone still emails CSVs). But in all the rush to standardize formats, we forgot a more important question:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;How do we know we can trust what we’re sharing?&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  The Silent Failure of Threat Feeds
&lt;/h2&gt;

&lt;p&gt;Here’s what happens in most organizations:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Feeds arrive in mixed formats — STIX 1.0, STIX 2.x, custom JSON, raw CSVs, XML.&lt;/li&gt;
&lt;li&gt;They get normalized for ingestion — good.&lt;/li&gt;
&lt;li&gt;But during that conversion, vital &lt;em&gt;context&lt;/em&gt; is lost.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Later, when an indicator triggers action, nobody can answer:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Who first reported this?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Has it been modified since ingestion?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Is this source historically reliable or just noisy?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Has anyone else independently confirmed it?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Has this intel already expired?&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Security teams end up reacting blindly. Over-alerting wastes time. Under-alerting causes breaches. Both are expensive.&lt;/p&gt;




&lt;h2&gt;
  
  
  Our Approach: Intelligence With Memory and Accountability
&lt;/h2&gt;

&lt;p&gt;Instead of building yet another parser, we’re building a &lt;strong&gt;provenance-aware, trust-scored intelligence pipeline&lt;/strong&gt; that treats every IOC like evidence — with a full &lt;strong&gt;receipt of how it got there&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;(See architecture diagram below.)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn7qpfe14qq8wnsc60n8k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn7qpfe14qq8wnsc60n8k.png" alt="Architecture diagram of a provenance-aware threat intelligence pipeline" width="800" height="299"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Normalization Without Losing Origin
&lt;/h3&gt;

&lt;p&gt;Every incoming feed gets converted to STIX 2.1 — but we don’t discard the past. We &lt;strong&gt;preserve and attach&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Original format &amp;amp; provider identity&lt;/li&gt;
&lt;li&gt;Schema validation results&lt;/li&gt;
&lt;li&gt;Mapping decisions made during transformation&lt;/li&gt;
&lt;li&gt;Historical failure/success rate of that feed&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;No IOC is just “added”. It’s &lt;strong&gt;documented&lt;/strong&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Trust Isn’t Yes/No — It’s a Score
&lt;/h3&gt;

&lt;p&gt;Instead of “allow/block”, we &lt;strong&gt;score&lt;/strong&gt; each indicator using machine learning (XGBoost):&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Factor&lt;/th&gt;
&lt;th&gt;Why it matters&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Source Reputation&lt;/td&gt;
&lt;td&gt;Has this feed been reliable before?&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Corroboration Count&lt;/td&gt;
&lt;td&gt;Has anyone else reported the same thing?&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sighting Frequency&lt;/td&gt;
&lt;td&gt;Is this active or long forgotten?&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Timeliness Decay&lt;/td&gt;
&lt;td&gt;Old intel should expire, not linger&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Pattern Anomalies&lt;/td&gt;
&lt;td&gt;Fake indicators often look weird&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;High-trust → auto-action.&lt;br&gt;
Medium-trust → analyst review.&lt;br&gt;
Low-trust → suppressed unless further confirmed.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Tamper-Evidence Without Hype
&lt;/h3&gt;

&lt;p&gt;Yes, we use blockchain — &lt;strong&gt;but only for what it’s actually good at&lt;/strong&gt;: &lt;strong&gt;proving that something *hasn’t been silently modified&lt;/strong&gt;*.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Each IOC’s provenance metadata gets &lt;strong&gt;hashed and recorded in a permissioned ledger&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;No public exposure of sensitive intel&lt;/li&gt;
&lt;li&gt;No tokens, no coins — just &lt;strong&gt;non-repudiation and traceability&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Not decentralization for the sake of it. &lt;strong&gt;Distributed attestation for accountability.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Why This Matters
&lt;/h2&gt;

&lt;p&gt;One security team we interviewed estimated &lt;strong&gt;over 42% of automated alerts were later dismissed as false positives&lt;/strong&gt; — yet still triggered escalations, meetings, and response procedures.&lt;/p&gt;

&lt;p&gt;Multiply that across teams, hours, and tools — and the cost of &lt;em&gt;bad intelligence&lt;/em&gt; becomes greater than &lt;em&gt;no intelligence&lt;/em&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  What’s Next
&lt;/h2&gt;

&lt;p&gt;We’re actively building this pipeline and sharing the journey step by step.&lt;/p&gt;

&lt;p&gt;Coming up:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A live trust score visualizer for IOCs&lt;/li&gt;
&lt;li&gt;Metadata-preserving feed normalizer showcase&lt;/li&gt;
&lt;li&gt;Real-world trust decay curves across sample feeds&lt;/li&gt;
&lt;li&gt;Private ledger-backed audit trail demo&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Your Turn
&lt;/h2&gt;

&lt;p&gt;If you work with threat feeds, answer two questions in the comments:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;What metadata do you wish you &lt;em&gt;never lost&lt;/em&gt; during ingestion?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;What trust score (0–100) would you &lt;em&gt;automatically block&lt;/em&gt; on?&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Because threat intelligence shouldn’t just be data.&lt;/p&gt;

&lt;p&gt;It should be &lt;em&gt;defensible&lt;/em&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  Follow Along
&lt;/h2&gt;

&lt;p&gt;We're building this in the open. The architecture, research notes, and &lt;br&gt;
design decisions are all on GitHub: &lt;br&gt;
&lt;a href="https://github.com/greykaizen/ThreatChain" rel="noopener noreferrer"&gt;github.com/greykaizen/ThreatChain&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you work with threat intel pipelines, have ideas about trust scoring &lt;br&gt;
signals, or can contribute anonymized feed telemetry — open an issue. &lt;br&gt;
We need practical input from people actually dealing with this problem.&lt;/p&gt;

&lt;p&gt;Code releases are coming within the year. Watch the repo if you want &lt;br&gt;
to see how the trust scorer and provenance ledger actually get built.&lt;/p&gt;

</description>
      <category>threatintelligence</category>
      <category>cybersecurity</category>
      <category>opensource</category>
      <category>blockchain</category>
    </item>
  </channel>
</rss>
