-
Question: With the set of thresholds and contamination parameters taken from plots 2, are we able to detect the attack before the attack is successful?
Objective: To showcase the time gap between t…
-
Bad documenttaion. not very long errors
Detecting toxicity in outputs generated by Large Language Models (LLMs) is crucial for ensuring that these models produce safe, respectful, and appropriate con…
-
On the example attack, take the current detections and map them into stix2 and from there load them into the taxii database
-
### Description
I've encountered some shell false positives for 932260 (PL1) , 932236 and 932239 (PL2) for commands like sudo, df, fd, and grc.
Some of these I'm obviously familiar with, but…
-
An attacker who manages to gain control of the `sd-app` VM (or exclusively of the client application within it) could attempt to create a new source via the news organization's source interface, and t…
-
https://github.com/elastic/detection-rules/blob/ac01718bb6dbd3f95463e809f94ce47005544508/rules/integrations/azure/initial_access_consent_grant_attack_via_azure_registered_application.toml#L17
this …
-
**Github username:** @codertjay
**Twitter username:** codertjay
**Submission hash (on-chain):** 0x2d8b300f1bbeb5ec78ff4ff85342a08df891f299a34cf9ac17ed993374872331
**Severity:** low
**Description:**
…
-
### Use case
Our App is using the package https://github.com/jeroentrappers/flutter_jailbreak_detection to detect Jailbreak on iOS and prevent usage of the App if it is detected. Recently we commissi…
-
## Description
Based on the reference [links](https://objectivebythesea.com/v2/talks/OBTS_v2_Zohar.pdf) for the "WebProxy Settings Modification" detection rule if an attacker wants to intercept…
aarju updated
5 months ago
-
i have got an error when i would like to execute the controler:
this is the error: FileNotFoundError: [Errno 2] No such file or directory: 'FlowStatsfile.csv'
help me please