Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

How To Automate Ticket Creation, Device Identification and Threat Triage With Tines

Posted on July 9, 2025July 9, 2025 By CWS

Jul 09, 2025The Hacker NewsSecurity Operations / Automation
Run by the group at workflow orchestration and AI platform Tines, the Tines library options over 1,000 pre-built workflows shared by safety practitioners from throughout the neighborhood – all free to import and deploy by means of the platform’s Neighborhood Version.
A current standout is a workflow that handles malware alerts with CrowdStrike, Oomnitza, GitHub, and PagerDuty. Developed by Lucas Cantor at Intercom, the creators of fin.ai, the workflow makes it simpler to find out the severity of a safety alert and escalate it seamlessly, relying on the gadget proprietor’s response. “It is a good way to cut back noise and add context to safety points which might be added on our endpoints as properly,” Lucas explains.
On this information, we’ll share an summary of the workflow, plus step-by-step directions for getting it up and working.
The issue – lack of integration between safety instruments
For safety groups, responding to malware threats, analyzing their severity, and figuring out the gadget proprietor to allow them to be contacted to resolve the risk, can take up a whole lot of time.
From a workflow perspective, groups usually need to:

Manually reply to CrowdStrike occasions
Enrich the alert with further metadata
Doc and alert the gadget proprietor in Slack
Notify on name groups through PagerDuty

Going by means of this course of manually can lead to delays and enhance the probabilities of human error.
The answer – automated ticket creation, gadget identification, and risk triage
Lucas’s prebuilt workflow automates the method of taking the malware alert and creating the case – whereas crucially notifying the gadget proprietor and the on-call group. This workflow helps safety groups precisely establish the extent of risk quicker by:

Detecting new alerts from Crowdstrike
Figuring out and notifying the gadget proprietor
Escalating vital points

The result’s streamlined response to malware safety alerts that ensures they’re handled rapidly, it doesn’t matter what the severity.
Key advantages of this workflow:

Diminished remediation time
Gadget proprietor is stored knowledgeable
Clear remediation and escalation pathways
Centralized administration system

Workflow overview
Instruments used:

Tines – workflow orchestration and AI platform (free Neighborhood Version accessible)
Crowdstrike – risk intelligence and EDR platform
Oomnitza – IT asset administration platform
Github – developer platform
PagerDuty – incident administration platform
Slack – group collaboration platform

The way it works

Half 1

Get a safety alert from CrowdStrike
Discover the gadget that the alert was triggered and lookup its particulars
Create a ticket in GitHub for the alert and lift the difficulty in a Slack message
If the gadget is owned by a person and it’s a low precedence,

Ship the proprietor a message requesting escalation

If the gadget is owned by a person and it’s a excessive precedence,

Create a PagerDuty Occasion to inform the on-call analyst
Informing the proprietor of the continuing problem

Half 2

Get a person interplay with the Slack message
Enrich the GitHub problem with the customers response
If the proprietor escalates the difficulty

Create a PagerDuty Occasion to inform the on-call analyst

Configuring the workflow – step-by-step information

1. Log into Tines or create a brand new account.
2. Navigate to the pre-built workflow within the library. Choose import. This could take you straight to your new pre-built workflow.
3. Arrange your credentials

You may want 5 credentials added to your Tines tenant:

CrowdStrike
Oomnitza
Github
PagerDuty
Slack

Word that related companies to those listed above may also be used, with some changes to the workflow.
From the credentials web page, choose New credential, scroll right down to the related credential and full the required fields. Comply with the CrowdStrike, Oomnitza, Github, PagerDuty, and Slack credential guides at defined.tines.com when you need assistance.
4. Configure your actions.

Set your surroundings variables. This consists of your:

Slack IT channel alerting webhook (`slack_channel_webhook_urls_prod`)
CrowdStrike/GitHub severity precedence mapping (`crowdstrike_to_github_priority_map`)

Configure CrowdStrike to alert the New CrowdStrike Detection webhook when a detection is created
Configure your SlackBot interactivity URL to the Obtain Slack Button Push webhook

5. Take a look at the workflow.
6. Publish and operationalize
As soon as examined, publish the workflow.
If you would like to check this workflow, you’ll be able to join a free Tines account.

Discovered this text fascinating? This text is a contributed piece from one in all our valued companions. Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Automate, Creation, Device, Identification, Threat, Ticket, Tines, Triage

Post navigation

Previous Post: SparkKitty Malware Attacking iOS and Android Users to Steal Gallery Images
Next Post: ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact

Related Posts

CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet The Hacker News
LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents The Hacker News
Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign The Hacker News
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks The Hacker News
Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks The Hacker News
Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Key Vulnerabilities, Threats, and Data Breaches
  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Key Vulnerabilities, Threats, and Data Breaches
  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News