Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

WhatsApp fixes a “zero click” bug used to hack Apple users with spyware

Researchers warn Sitecore exploit chain linking cache addiction and remote code execution

Meta Update Chatbot Rules Avoid inappropriate topics with teenagers

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » How to automate CVE and vulnerability advisory responses with Tines
Identity

How to automate CVE and vulnerability advisory responses with Tines

userBy userMay 2, 2025No Comments7 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 2, 2025Hacker NewsVulnerability Management/Security Operations

Run by teams on workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared by security practitioners across the community.

The latest standout is workflows that automate security advisory monitoring from CISA and other vendors, enrich recommendations with cloud strike threat intelligence, and streamline ticket creation and notifications. Developed by Josh Mclaughlin, a security engineer at LivePerson, this workflow significantly reduces manual work and allows teams to grasp new vulnerabilities while keeping analysts in control of final decisions.

“Before automation, it took about 150 minutes to create tickets for the 45 vulnerabilities,” explains Josh. “After automation, the time required for the same number of tickets was reduced to about 60 minutes, saving a significant amount of time, freeing analysts from manual tasks like copy pasting and web browsing.” The LivePerson security team has reduced the time this process takes 60% through automation and orchestration, significantly increasing both efficiency and analyst morale.

In this guide, we share an overview of the workflow, as well as step-by-step instructions for getting it up and running.

Issue – Manual Tracking of Important Advisories

While timely awareness of newly disclosed vulnerabilities is essential for security teams, monitoring multiple sources, enriching advisory with threat intelligence and creating tickets for remediation is a time-consuming, error-prone task.

Teams often:

Manually review CISA and other sources CVEs related to Advisory Research determine whether action is required, create tickets manually, and notify stakeholders

These repetitive steps not only consume valuable analyst time, but also put inconsistent reactions at risk if critical vulnerabilities are missed or delayed.

Solutions – Automatic monitoring, enrichment, tickets

Josh’s pre-built workflow automates the process end-to-end, but importantly, analysts continue to control it at key decision points.

Pull new advisories from the CISA (or your selected open source feed). Use CrowdStrike’s threat intelligence to enhance your findings, notify Slack’s security teams, prompt them to approve and reject buttons on approval to provide prompt input, and automatically create ServiceNow tickets with details of the vulnerability.

The result is a streamlined and efficient process that ensures vulnerabilities are quickly tracked, quickly tracked and executed without sacrificing critical thinking and prioritization that only analysts can offer.

Important benefits of this workflow:

By leveraging threat intelligence for smart prioritization that reduces manual effort and speeds up response times, consistent handling of new vulnerabilities will enhance collaboration across security, IT teams boost morale by eliminating boring tasks, and analysts can control with simple and fast approval

Workflow Overview

Tools used:

Tines – Workflow Orchestration and AI Platform (Community Edition Available) Cloud Striker – Threat Intelligence and EDR Platform ServiceNow – Tickets and ITSM Platform Slack – Team Collaboration Platform

How it works:

RSS Feed Collection: Get the latest advisory from CISA’s RSS Feed Deduplication: Filters Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out Out CVE Extraction: Identifies the CVE from the advisory description. Context enrichment: Cloud strike threat intelligence and cross-reference slack notification for cross-reference cross-reference contexts: Send enrichment vulnerabilities with action buttons to a dedicated slack channel approval flow.

Configuring Workflows – Step-by-Step Guide

Tines Community Edition Sign-up Form

1. Log in to Tyne or create a new account.

2. Go to the library’s pre-built workflow.[インポート]Select . This requires direct take on new, pre-built workflows.

Tines’ Drag and Drop Canvas Workflow
Add new credentials to Tines

3. Set your credentials

Three credentials must be added to the Tines tenant.

Cloud StrikeServiceNow Slack

Please note that you can also use similar services to those listed above. Adjust the workflow.

From the Credentials page, select your new credentials and scroll to the relevant credentials to complete the required fields. Follow the CrowdStrike, ServiceNow and Slack Credentials Guide at explained.com.

4. Configure the action.

Configure the Slack channel (slack_channel_vuln_advisory resource) for advisory notifications. Set the ServiceNow ticket details to the Create ServiceNow action ticket (priority, assignment group). Adjust vendor filtering rules if necessary to match your organization’s priorities.

5. Test your workflow.

Pull recent advisories from the CISA to trigger the test and verify:

Slack notifications will be sent using the correct format approval button function.

6. Publish and operate

Once tested, publish your workflow. Share your Slack channel with your team to efficiently begin reviewing and approving advisory.

If you want to test this workflow, you can sign up for a free Tines account.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUK commercial EV charging crisis threatens net zero ambitions
Next Article Global studies show that countries can reduce antibiotic resistance
user
  • Website

Related Posts

Researchers warn Sitecore exploit chain linking cache addiction and remote code execution

August 29, 2025

Amazon abuses APT29 watering campaign Abuses Microsoft device code authentication

August 29, 2025

Abandoned Sogou Zhuyin Update Server Hijacking, weaponized campaign in the Thai One Spy Campaign

August 29, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

WhatsApp fixes a “zero click” bug used to hack Apple users with spyware

Researchers warn Sitecore exploit chain linking cache addiction and remote code execution

Meta Update Chatbot Rules Avoid inappropriate topics with teenagers

Mastodon says it has no means to comply with age verification laws

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.