-
The remote access model was added some time ago (w.e.f. v5e2-4-15). It includes several modelling error threats to detect:
- cases where an interactive process has no (local or remote) interactive …
-
We should consider adding the ability to capture one or more threat "scores" (or levels, etc.) as part of a TTP. While this would be arbitrary and highly contextually dependent, the ability to score t…
-
Ik kwam per abuis dit tegen:
https://community.bistudio.com/wiki/CfgVehicles_Config_Reference#camouflage
https://community.bistudio.com/wiki/CfgVehicles_Config_Reference#cost
https://community.bistudi…
-
### Summary
When leveraging a detection rule with a [timestamp override](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#rule-ui-advanced-params), there are some missing feature…
-
# Make it more clear that the Indicator Match rule apply exception also for the threat index
Currently, when you create an exception in the Indicator Match rule, it applies both to the source index…
-
when opening this website ending with .now.sh (or react-window) norton prevents the site from being opened because of:
Threat Name: Web Attack: Fake TechSupport Website
Location: https:// mxcdn1 .…
-
https://github.com/mongodb/mongo-cxx-driver/releases
Once done, make sure to update also our own instructions. These at the moment point to 1.0.5 legacy: https://github.com/3drepo/3drepobouncer/wiki/…
-
Thank you for this very interesting ATT&CK-alike taxonomy!
It would be great if this taxonomy could be provided in a machine parsable format such as JSON.
That should allow CTI tooling to use the …
-
Some of the boilerplate threats/recommendations text doesn't line up to species or even natural communities, but does match to specific habitats (e.g. shale barrens) or possibly geographic regions (e.…
-
**Describe the bug**
- Split/Join points can generate hundreds of miles from the target. Nav points are jammed together between hold and join/split.
- Flight path can take you right through the w…