Skip to content

Commit 3b46c76

Browse files
authored
Updated to latest version (#5561)
1 parent c641b8a commit 3b46c76

File tree

1 file changed

+3
-5
lines changed

1 file changed

+3
-5
lines changed

docs/security/threat-intelligence/notice-about-taxii2.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,17 +12,15 @@ description: This article is a product defect notification for missing indicator
1212

1313
## Summary of the issue
1414

15-
We are notifying you of a recently identified issue that affects Sumo Logic’s Threat Intelligence feeds using the TAXII 2.0 protocol. Specifically, URL, domain, and email Indicators of Compromise (IOCs) were not processed and displayed as expected. A customer first reported the issue on June 11, 2025.
16-
17-
Our investigation determined that a processing error in certain non-hash IOCs led to a breakdown in the normalization process, preventing these critical data types from appearing correctly in customer environments.
15+
We are notifying you of a recently identified issue that affects Sumo Logic’s Threat Intelligence feeds using the TAXII 2.0 protocol. Specifically, URL, domain, and email Indicators of Compromise (IOCs) were not processed and displayed as expected. Our investigation determined that a processing error in certain non-hash IOCs led to a breakdown in the normalization process, preventing these critical data types from appearing correctly in customer environments.
1816

1917
If your environment relies on TAXII 2.0-based Threat Intelligence feeds, you may have experienced the following:
2018
* Missing URL, domain, and email IOCs in your threat feeds
2119
* Incomplete detection logic, resulting in gaps in dashboards, threat hunting, and alerting mechanisms that depend on these data types
2220

2321
Our engineering team has traced the issue to a normalization defect in the data processing pipeline, occurring after collection but prior to feed availability.
2422

25-
A fix has been developed and is scheduled for deployment on July 9, 2025. There is no action you or your team needs to take in order to correct this.
23+
A fix has been developed and is scheduled for a rolling deployment starting on July 9, 2025. There is no action you or your team needs to take in order to correct this.
2624

2725
## Important to note
2826

@@ -35,7 +33,7 @@ A fix has been developed and is scheduled for deployment on July 9, 2025. There
3533
To mitigate the risk of future issues, we are implementing the following changes:
3634
* Expanded automated and manual test coverage across all supported threat feed protocols.
3735
* Strengthened validation and normalization processes across the pipeline.
38-
* Continuous monitoring and alerting enhancements to detect processing anomalies earlier
36+
* Continuous monitoring and alerting enhancements to detect processing anomalies earlier.
3937

4038
## Need help or have questions?
4139

0 commit comments

Comments
 (0)