diff --git a/Packs/FeedUnit42v2/Integrations/FeedUnit42v2/FeedUnit42v2.yml b/Packs/FeedUnit42v2/Integrations/FeedUnit42v2/FeedUnit42v2.yml index ff91da143562..1dade5c8728b 100644 --- a/Packs/FeedUnit42v2/Integrations/FeedUnit42v2/FeedUnit42v2.yml +++ b/Packs/FeedUnit42v2/Integrations/FeedUnit42v2/FeedUnit42v2.yml @@ -111,7 +111,7 @@ script: - attack-pattern description: Retrieves a limited number of the indicators. name: unit42-get-indicators - dockerimage: demisto/taxii2:1.0.0.69228 + dockerimage: demisto/taxii2:1.0.0.72332 feed: true runonce: false script: '-' diff --git a/Packs/FeedUnit42v2/ReleaseNotes/1_0_35.md b/Packs/FeedUnit42v2/ReleaseNotes/1_0_35.md new file mode 100644 index 000000000000..69045456afa8 --- /dev/null +++ b/Packs/FeedUnit42v2/ReleaseNotes/1_0_35.md @@ -0,0 +1,3 @@ +#### Integrations +##### Unit 42 ATOMs Feed +- Updated the Docker image to: *demisto/taxii2:1.0.0.72332*. diff --git a/Packs/FeedUnit42v2/pack_metadata.json b/Packs/FeedUnit42v2/pack_metadata.json index d9d11c7ec964..6c684554fbcc 100644 --- a/Packs/FeedUnit42v2/pack_metadata.json +++ b/Packs/FeedUnit42v2/pack_metadata.json @@ -2,7 +2,7 @@ "name": "Unit 42 ATOMs Feed", "description": "Unit 42 feed of published IOCs which contains malicious indicators.", "support": "xsoar", - "currentVersion": "1.0.34", + "currentVersion": "1.0.35", "author": "Cortex XSOAR", "url": "https://www.paloaltonetworks.com/cortex", "email": "",