-
**Related to:** https://github.com/elastic/detection-rules/issues/3100
## Summary
This is a recurring ticket. We take it into work every release cycle. We don't close it, instead, we update its …
-
Under Defense Evasion one of the evasion techniques is "Misconfiguration of security measures". I believe this should be more like "disable security measures" or perhaps "disable or misconfigure secu…
-
I was setting up powers and couldn’t figure out the property name for using the attribute defense score from another attribute.
An example is _Integrity_ where you use the Logic defense score for …
-
Following the build commands for a server seems to flare up windows defender, defense evasion of sorts. Dunno if this should be a GH issue or not but here
-
In the load parser function please add a simple tag counter, this will give an indication about how unbalanced is the dataset.
We expect to see some fat tail distribution.
Cheers
-
https://www.ired.team/offensive-security/defense-evasion/acg-arbitrary-code-guard-processdynamiccodepolicy
-
There are other publicly known attack methods in Kubernetes, would be great to see documented and automated.
Cred Access:
* Call token request `POST /api/v1/namespaces/$NS/serviceaccounts/$SA/to…
-
modulation = evasion
evasion = avoidance
suppression OK
induction >> to be reviewed
-
What problem does your feature request solve?
Currently, the tool does a good job of decomposing the architecture and applying threats according to the STRIDE framework. This still leaves some gaps i…
-
Johnny Cage (Threat Intel team): Take an extra look for data obfuscation and defense evasion techniques. We spotted an increase usage of those for deleting backups!
[Article](https://www.cybereaso…