Skip to main content

🧠 Smarter Object Correlation in ThreatQ: ACE Parser Now Links Existing Objects Automatically

Related products:Integrations
  • November 2, 2025
  • 0 replies
  • 5 views

Forum|alt.badge.img+1

 

Smarter Object Correlation in ThreatQ: ACE Parser Now Links Existing Objects Automatically

 

Product Area: ThreatQ Intelligence Platform → Integrations

Release Version: ThreatQ v6.13.0

Audience: Threat Intel Analysts, Integrators, Platform Admins

Last Updated: November 2, 2025

 


 

Overview

The ACE parser in ThreatQ just got smarter.

With the latest v6.13.0 update, the ACE parser now automatically links to existing system objects in your Threat Library — reducing duplicates, preserving context, and improving enrichment accuracy across integrations.

 


 

What’s New

  • Automatic Linking:

    The ACE parser now detects existing Threat Library objects and links them instead of creating duplicates.

  • Exact Name Matching:

    Matches are case-insensitive and based on exact object names — for example, Sad Panda, SadPanda, and Sad-Panda all match.

  • Configurable Behavior:

    Matching behavior respects your TQO action configuration — you can define which object types to parse or exclude.

  • ACE-only Object Exception:

    Objects sourced exclusively from ACE are excluded from keyword matching to prevent false correlations.

 


 

Why It Matters

This enhancement delivers:

  • Cleaner data by reducing duplicate objects.

  • Higher automation accuracy in parsing and enrichment workflows.

  • Improved integration performance for large-volume data feeds.

 


Learn More

📘 Visit the ThreatQ Help Center for details on ACE parser configuration and integration workflows.

 


💡 Try the new ACE parser capabilities in ThreatQ v6.13.0 and share your feedback in the comments — we’d love to hear how these improvements streamline your enrichment workflows!

0 replies

Be the first to reply!