-
It might be helpful to have the application generate a cif configuration that a user can cut and paste into their CIF instance. That would make it easier to configure CIF to pull in the feeds.
I thi…
-
Step-by-Step Explanation of How I used to Azure to recognize the attacks and the steps I will later take to slow down/prevent such attacks:
Identify the Logs:
In Azure, most security events and att…
-
We are successfully generating our feeds using feed-generate.py but when we add them to a different MISP instance, the following message is presented on debug logs:
==> error.log downloadAndParseEv…
-
So as we could see in the last past days, community voted with slight lead on the implementation of current version of the RandomX algorithm, however, lets analyze the decision
https://github.com/…
-
```
What steps will reproduce the problem?
1.the destination can easily identify the attacks are happening from same
system by identifying hardware address of source.
2. it can be mitigated easily…
-
This idea is a bit out there and I lack some networking understanding to determine whether it is doable at all.
There are a few companies out there that provide access to a proxy network of "reside…
-
Is this safe to use?
I found some fishy lines of code on line 0 that give me grave concern. When I executed nocode in a virtual machine, it kept trying to ping botnet.microsoft.com, and gave the ou…
-
**Describe the bug**
I'm seeing some actor data differences when using the website vs the API.
For example, the [`beijing_group`](https://malpedia.caad.fkie.fraunhofer.de/actor/beijing_group) has…
-
How to add bots to c2
-
I believe it's time to seriously review the proof of work algorithm used in Monero in light of the very serious consequences we have all witness with mining centralization in the Bitcoin community.
…