-
Hello,
We would like to propose a new SRO (STIX Relationship Object) between two Threat-Actors or between two Malwares. Indeed, we see in the past that some groups shut down its activities, and join…
-
https://www.databreaches.net/de-darkside-threat-actors-attempted-to-extort-mobelstadt-sommerlad/
-
## Description
Error to add a connector, I edited the stack on portainer 2.11.0
## Environment
1. Running .ova on VirtualBox, Window 11
2. OpenCTI version: 5.3.15
## Reproducible Step…
-
> SIV needs a more formal threat model.
>
> Formally stating what adversaries you expect to prevent what sorts of attacks is a really important part of designing any cryptographic system. When exam…
-
Hi :)
With the goal of create relations between threat actors and vulnerabilities exploited/used, I would like to propose if it's possible include the field `cfr-vulnerabilities-exploited` as an of…
-
**Distribution (run `cat /etc/os-release`):**
**Related Application and/or Package Version (run `apt policy $PACKAGE NAME`):**
**Issue/Bug Description:**
I recently switched ov…
-
## Description
Not consistent display of part-of relationships in the knowledge tab of a Threat Actor. Independently of the "direction" of the relationship, the icon displayed is the same. Howeve…
-
Description:
“Traditional perimeter-based network defenses with multiple layers of disjointed security technologies have proven themselves to be unable to meet the cybersecurity needs due to the…
-
The threat actor construct needs some ability to represent pieces of information (breadcrumbs) left behind that indicate attribute to that particular threat actor. For example, an e-mail address, text…
-
## Use case
Outcome templates by entity types.
See special project.
## Proposed solution
- Be able to define a template for some containers (at least reports), that will generate automatic…