Skip to content
41 changes: 21 additions & 20 deletions Packs/CybleEventsV2/Integrations/CybleEventsV2/CybleEventsV2.py
Original file line number Diff line number Diff line change
Expand Up @@ -1327,7 +1327,8 @@ def main():
verify_certificate = not params.get("insecure", False)
proxy = params.get("proxy", False)
hide_cvv_expiry = params.get("hide_data", False)
demisto.debug(f"Command being called is {params}")
command = demisto.command()
demisto.debug(f"Command being called is {command}")
mirror = params.get("mirror", False)
incident_collections = params.get("incident_collections", [])
incident_severity = params.get("incident_severity", [])
Expand All @@ -1336,42 +1337,42 @@ def main():
client = Client(base_url=params.get("base_url"), verify=verify_certificate, proxy=proxy)
args = demisto.args()

if demisto.command() == "test-module":
url = base_url + str(ROUTES[COMMAND[demisto.command()]])
if command == "test-module":
url = base_url + str(ROUTES[COMMAND[command]])
return_results(test_response(client, "GET", url, token))

elif demisto.command() == "fetch-incidents":
elif command == "fetch-incidents":
last_run = demisto.getLastRun()

url = base_url + str(ROUTES[COMMAND[demisto.command()]])
url = base_url + str(ROUTES[COMMAND[command]])
data, next_run = cyble_events(
client, "POST", token, url, args, last_run, hide_cvv_expiry, incident_collections, incident_severity, False
)

demisto.setLastRun(next_run)
demisto.incidents(data)

elif demisto.command() == "update-remote-system":
elif command == "update-remote-system":
if mirror:
url = base_url + str(ROUTES[COMMAND[demisto.command()]])
url = base_url + str(ROUTES[COMMAND[command]])
return_results(update_remote_system(client, "PUT", token, args, url))
return

elif demisto.command() == "get-mapping-fields":
url = base_url + str(ROUTES[COMMAND[demisto.command()]])
elif command == "get-mapping-fields":
url = base_url + str(ROUTES[COMMAND[command]])
return_results(get_mapping_fields(client, token, url))

elif demisto.command() == "cyble-vision-subscribed-services":
elif command == "cyble-vision-subscribed-services":
return_results(fetch_subscribed_services_alert(client, "GET", base_url, token))

elif demisto.command() == "cyble-vision-fetch-iocs":
elif command == "cyble-vision-fetch-iocs":
validate_iocs_input(args)
url = base_url + str(ROUTES[COMMAND[demisto.command()]])
url = base_url + str(ROUTES[COMMAND[command]])
command_results = cyble_fetch_iocs(client, "GET", token, args, url)
return_results(command_results)

elif demisto.command() == "cyble-vision-fetch-alerts":
url = base_url + str(ROUTES[COMMAND[demisto.command()]])
elif command == "cyble-vision-fetch-alerts":
url = base_url + str(ROUTES[COMMAND[command]])
lst_alerts = cyble_events(
client, "POST", token, url, args, {}, hide_cvv_expiry, incident_collections, incident_severity, True
)
Expand All @@ -1384,25 +1385,25 @@ def main():
)
)

elif demisto.command() == "get-modified-remote-data":
url = base_url + str(ROUTES[COMMAND[demisto.command()]])
elif command == "get-modified-remote-data":
url = base_url + str(ROUTES[COMMAND[command]])
return_results(
get_modified_remote_data_command(
client, url, token, args, hide_cvv_expiry, incident_collections, incident_severity
)
)

elif demisto.command() == "get-remote-data":
url = base_url + str(ROUTES[COMMAND[demisto.command()]])
elif command == "get-remote-data":
url = base_url + str(ROUTES[COMMAND[command]])
return_results(
get_remote_data_command(client, url, token, args, incident_collections, incident_severity, hide_cvv_expiry)
)

else:
raise NotImplementedError(f"{demisto.command()} command is not implemented.")
raise NotImplementedError(f"{command} command is not implemented.")

except Exception as e:
return_error(f"Failed to execute {demisto.command()} command. Error: {str(e)}")
return_error(f"Failed to execute {command} command. Error: {str(e)}")


if __name__ in ("__main__", "__builtin__", "builtins"):
Expand Down
6 changes: 6 additions & 0 deletions Packs/CybleEventsV2/ReleaseNotes/1_1_2.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@

#### Integrations

##### CybleEvents v2

- Logging improvements.
2 changes: 1 addition & 1 deletion Packs/CybleEventsV2/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "CybleEventsV2",
"description": "Cyble Events for Vision Users. Must have Vision API access to use the threat intelligence.",
"support": "partner",
"currentVersion": "1.1.1",
"currentVersion": "1.1.2",
"author": "Cyble Info Sec",
"url": "https://cyble.com/",
"email": "",
Expand Down
1 change: 0 additions & 1 deletion Packs/Gem/Integrations/Gem/Gem.py
Original file line number Diff line number Diff line change
Expand Up @@ -1118,7 +1118,6 @@ def main() -> None:
command = demisto.command()

demisto.debug(f"args {args}")
demisto.debug(f"params {params}")

demisto.debug(f"Command being called is {command}")
try:
Expand Down
1 change: 1 addition & 0 deletions Packs/Gem/Integrations/Gem/Gem.yml
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,7 @@ configuration:
name: first_fetch
required: false
type: 0
section: Collect
- display: Use system proxy settings
name: proxy
type: 8
Expand Down
6 changes: 6 additions & 0 deletions Packs/Gem/ReleaseNotes/1_0_7.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@

#### Integrations

##### Gem

- Logging improvements.
2 changes: 1 addition & 1 deletion Packs/Gem/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "Gem",
"description": "Integrate with Gem to use alerts as a trigger for Cortex XSOAR’s custom playbooks, and automate response to specific TTPs and scenarios.",
"support": "partner",
"currentVersion": "1.0.6",
"currentVersion": "1.0.7",
"author": "Gem Security",
"url": "https://gem.security/",
"email": "[email protected]",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -205,7 +205,6 @@ def main(): # pragma: no cover
command = demisto.command()
demisto.info(f"Command called {command}")
demisto.info(f"Args are {args}")
demisto.info(f"params are {params}")
client = Client(params)
try:
if command == "quttera-scan-start":
Expand Down
Original file line number Diff line number Diff line change
@@ -1,3 +1,6 @@
sectionOrder:
- Connect
- Collect
commonfields:
id: QutteraWebsiteMalwareScanner
version: -1
Expand All @@ -15,15 +18,17 @@ configuration:
name: apikey
required: true
type: 4
section: Connect
- display: Quttera Scanner URL
name: base_url
required: true
defaultvalue: "https://scannerapi.quttera.com"
type: 0
section: Connect
script:
type: python
subtype: python3
dockerimage: demisto/python3:3.11.10.115186
dockerimage: demisto/python3:3.12.11.4208709
script: ''
commands:
- name: quttera-scan-start
Expand Down
7 changes: 7 additions & 0 deletions Packs/QutteraWebsiteMalwareScanner/ReleaseNotes/1_0_21.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@

#### Integrations

##### QutteraWebsiteMalwareScanner
- Updated the Docker image to: *demisto/python3:3.12.11.4208709*.

- Logging improvements.
2 changes: 1 addition & 1 deletion Packs/QutteraWebsiteMalwareScanner/pack_metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "Quttera Website Malware Scanner",
"description": "Detect suspicious/malicious/blocklisted content on domains/URLs. Run real-time normal/heuristic scan and database queries.",
"support": "partner",
"currentVersion": "1.0.20",
"currentVersion": "1.0.21",
"author": "Quttera LTD",
"url": "https://scannerapi.quttera.com/api/v3",
"email": "[email protected]",
Expand Down
Loading