November 21, 2022
                        
                        We are pleased to announce the immediate availability of MISP v2.4.165 with many improvements to the workflow subsystem along with various performance improvements.
Improvements
- [workflow] Module to toggle/remove the to_ids flag
 - [workflow] Added generic module to support attribute edition
 - [workflow] [triggers:event_after_save_new] Added 2 new triggers for new events and new events from pull.
 - [workflow:execute_module] Allow to ignore format conversion before executing module.
 - [workflows:triggers] Added filtering capability on the index
 - [CLI] Feed management added
 - [CLI] Pretty and JSON output added in list and view feeds
 - [Auth] OpenID connect improved
 - [freetext] Fetch security vendor domains from warninglist
 - [UI] Allow to disable PGP key fetching
 - [UI] Show warning if user don’t have permission to use API
 - [tool:evengraph] Include relationships when using pivot key
 - [UI] Show servers where event will be pushed
 
Performance improvements
- [feed] Store freetext feed compressed in cache
 - [internal] Store some data in Redis compressed to save memory
 - [correlation] Do not correlate over correlating value again for full correlation
 - [internal] Add support for simdjson extension
 - [warninglist] Load warninglist from Redis for TLDs and security vendors
 
Bugs fixed
- [tags] not passing name, filter, search all together would lead to the search not working
 
Security issues
- [security] Permission for tag collections
 - [security] Check user permission when attaching clusters
 
We strongly recommend MISP administrators to update to this latest version.
For a more detailed changelog, please see the online Changelog.
New workflow blueprints available
New workflow blueprints were added to support new use-cases.
- Attach 
tlp:clearontlp:white- Attach thetlp:cleartag on elements having thetlp:whitetag. PAP:REDandtlp:redBlocking - Block actions if any attributes have thePAP:REDortlp:redtag.- Remote 
to_idsflag if the indicator appears in known file list - Disable to_ids flag for existing hash in hashlookup. - Set tag based on BGP Ranking maliciousness level - Set tag based on BGP Ranking maliciousness level.
 
New MISP modules
- [expansion] Added extract_url_components module to create an object from an URL attribute.
 - [expansion] New crowdsec expansion module added.
 - [expansion] New VARIoT IoT exploits database expansion module added.
 - [expansion] Updates on hyasinsight expansion module.
 
MISP taxonomies
- new misp-workflow taxonomy to have a consistent tag message for the MISP workflow.
 - Taxonomy in support of integrating MISP with Sentinel. Sentinel indicator threat types added.
 
For more details.
MISP galaxy
- Many updates to the threat actor database.
 - Update to the MITRE ATT&CK framework to version 12.0.
 
For more details.
MISP objects
- New object to describe Telegram bots.
 - Updated exploit object.
 
For more details.