September 2025 Integration+ Connector Releases
Updates made to the Integration+ connectors in September 2025.
New
-
Endor Labs v3.0.0
Endor Labs is an application security tool. You can bring package, project, repository, and other security data from Endor Labs into Brinqa.
-
Fortify Software Security Center v3.1.0
Fortify Software Security Center (SCC) is an application security tool. You can bring application, application version, dynamic code, and static code data from Fortify SCC into Brinqa.
-
IriusRisk v3.0.0
IriusRisk is a threat intelligence tool that helps organizations identify and mitigate security risks in their projects. You can bring component, countermeasure, project, and threat data from IriusRisk into Brinqa.
Updated
-
Adaptive Shield v3.0.6
The Adaptive Shield connector has been updated to fix an issue where duplicate Violation records were being created. This was caused by including fields such as DISMISS_EXPIRATION_DATE and DISMISS_REASON when generating the UID. The Violation object now uses only the ENTITY_NAME, INTEGRATION_ID, and SECURITY_CHECK_ID attributes to generate the UID. It is strongly recommended to purge existing data associated with this connector before updating to v3.0.6.
-
Amazon Inspector v3.0.18
The Amazon Inspector connector has been updated to add the IN_USE_COUNT and LAST_USED attributes to the AWS EC2 Instance and Cloud Resource objects. These attributes can help prioritize vulnerabilities based on how frequently an Amazon ECR image is deployed and when it was last used.
-
Aqua Enterprise and Aqua SaaS v4.0.4
The Aqua connectors have been updated to add support for Data lifecycle management to the Container, Container Image, Host, and Vulnerability objects. While this change was introduced in v3.1.3, it has now been fully implemented in the v4.0+ version of the connector.
-
Armis v3.0.1
The Armis connector has been updated to add support for the Reports API on the Vulnerability object. This change significantly improves sync performance and reduces the time it takes for the Vulnerability object to sync.
-
Censys v3.0.6
The Censys connector has been updated with the following changes:
-
3.0.6:
- The connector now retrieves the Web Entity object from Censys.
- Fixed an issue where tags on the Certificate object were not populating.
-
3.0.5: Fixed an issue where tags on the Domain object values were not being populated.
-
-
Checkmarx SAST v3.2.3
The Checkmarx SAST connector has been updated to fix an issue where the Static Code Finding object sync could cause the Brinqa Agent to run out of storage and fail. The connector now processes findings more efficiently during sync to avoid high disk usage.
-
CrowdStrike Cloud Security v3.2.7
The CrowdStrike Cloud Security connector has been updated with the following changes:
-
3.2.7: Fixed an issue where the Package object sync was failing in subsequent delta syncs.
-
3.2.5:
-
The connector now retrieves the Container and Package objects from the CrowdStrike API.
-
Added the EXPLOITED_STATUS and REMEDIATION_AVAILABLE attributes to the Vulnerability object.
-
Resolved some data type mismatch errors.
-
Code clean up and general maintenance.
-
-
-
CrowdStrike Endpoint Security v3.2.6
The CrowdStrike Endpoint Security connector has been updated to fix an issue where the LAST_FOUND date timestamp was not populating correctly for the Vulnerability object. As a result, the connector now uses improved logic to more accurately determine when a vulnerability was last observed. For open issues, the timestamp is based on the host’s last seen time or the vulnerability’s update time. For closed issues, the connector uses the vulnerability’s closed or updated timestamp.
-
CSV Connector v3.0.12
The CSV Connector has been updated to update the connector icon. This change only affects the connector icon and does not impact functionality. You can update without making any changes to your existing configurations.
-
Endor Labs v3.0.1
The Endor Labs connector has been updated to add the NAMESPACE attribute to the Finding and Package objects.
-
Google Security Command Center v3.2.6
The Google Security Command Center connector has been updated to fix an issue where the severity level of findings from Google Security Command Center were not accurately reflected in Brinqa.
-
HackerOne v3.0.6
The HackerOne connector has been updated with the following changes:
- Added the REPORT_SUMMARIES attribute to the Pentest Finding object.
- The Pentest Finding Definition object has a new API Endpoint to support retrieving report summaries from HackerOne:
v1/reports/{reportId}
. - Added a new additional setting to help manage API throttling: Max retries.
- Added a new additional setting to include the report summary for Pentest Findings from HackerOne: Include summary.
- Code clean up and general maintenance.
-
Jira Cloud v3.1.20
The Jira Cloud connector has been updated to fully transition to the Jira REST API v3. As a result, several deprecated v2 endpoints have been replaced with their v3 equivalents, and the connector now uses the
rest/api/3/search/jql
endpoint for JQL-based queries. These changes ensure continued compatibility with Atlassian's supported API versions. -
JSON Connector v3.0.2
The JSON Connector has been updated to update the connector icon. This change only affects the connector icon and does not impact functionality. You can update without making any changes to your existing configurations.
-
Microsoft Defender for Endpoint v3.4.20
The Microsoft Defender for Endpoint connector has been updated to fix an issue where the incorrect recommendations were populating for the Vulnerability Definition object. As a result, the RECOMMENDATION_ID attribute was added to the Vulnerability Definition object. This will impact how UID's are generated for vulnerability definitions. Therefore, it is strongly recommended to purge existing data associated with this connector before updating to v3.4.20.
-
Orca v3.1.7
The Orca connector has been updated with the following changes:
-
3.1.7: Code clean up and general maintenance.
-
3.1.6:
- Updated the API endpoint used by the Alert and Alert Definition objects. The Alert and Alert Definition objects now use the
api/sonar/query
endpoint. - Fixed an issue where several connector object syncs were failing.
- Replaced the SYS_ID attribute on all objects with UID.
- Updated the API endpoint used by the Alert and Alert Definition objects. The Alert and Alert Definition objects now use the
-
-
PlexTrac v3.0.11
The PlexTrac connector has been updated to fix an issue where the FINDING_ID attribute on the Finding object was not being populated.
-
Prisma Cloud v3.2.3
The Prisma Cloud connector has been updated to fix an issue where the Cloud Resource and Violation object syncs were failing.
-
Qualys Vulnerability Management v5.3.24
The Qualys Vulnerability Management connector has been updated to fix an issue where multiple detections of the same vulnerability on the same host were not being represented as distinct Vulnerability records. This occurred because the UID was generated using only the HOST_ID, QID, PORT, PROTOCOL, and SERVICE attributes, which caused different detections to overwrite each other in Brinqa. The connector now maps a detection's UNIQUE_VULN_UID as the Vulnerability UID to ensure each detection is represented appropriately. For detections where UNIQUE_VULN_ID is not available, the connector will continue to use the MD5 hash of the HOST_ID, QID, PORT, PROTOCOL, and SERVICE attributes.
If you have existing data integrations for Qualys VM, please contact your Brinqa Support team before upgrading to v5.3.24 so they can assist you in transitioning your existing Vulnerability records to the new UID format.
-
Rapid7 Nexpose v3.4.17
The Rapid7 Nexpose connector has been updated with the following changes:
-
3.4.17: Added a new additional setting that enables you to specify a comma-separated list of cloud properties to promote as attributes on the Host object: Cloud Properties.
-
3.4.16: Fixed an issue where some Vulnerability records were missing the LAST_FOUND attribute. This occurred when the associated Host did not have a LAST_SCANNED value, even though a LAST_SEEN value was present. The connector now sets LAST_FOUND on the Vulnerability object using the more recent of the Host's LAST_SCANNED and LAST_SEEN values.
-
-
Semgrep v3.0.2
The Semgrep connector has been updated with the following changes:
- The connector now retrieves the Open Source Finding and Open Source Finding Definition objects from Semgrep, adding support for ingesting SCA findings.
- Updated several mappings on the Static Code Finding and Static Code Finding Definition objects.