-
In STIX, it leverages observable patterns to do so. Is that something we should replicate in TWIGS, and if so, should it
This has been a point of confusion in STIX, so it's probably worth rethinking…
-
Aloha, we've been seeing a pattern of growing daily memory usage (followed by increasing slugishness then non-responsiveness above around 1-2GB of RAM) in the 'proxy' pod:
The different colors ar…
-
Domestic violence is the willful intimidation, physical assault, sexual assault, and/or other abusive behavior as part of a systematic pattern of power and control perpetrated by one person against an…
-
This will involve restructuring the data model to more clearly delineate the semantics of various forms of TTP (malware, attack patterns, infrastructure, victim targeting) as separate types of TTP rat…
-
The current draft describes invalid curve attacks as based side channels.
Section 1:
> For elliptic curve DH, invalid curve attacks broadly follow
the same pattern, where a long-lived secret i…
-
At the very least, the 4A's (Action, Actor, Attribute, and Asset) plus Timeline, Victim Demographics, Discovery Method, and Impact should be capitalized. Also, all patterns should be Capitalized.
Le…
-
Hi - cool project! Looking forward to seeing it develop.
Regarding the first item on the list of missing datasets, I wanted to let you know that over the past year or two, [several cities](https://…
-
I believe this application might have a Trojan in it, there are multiple security notifications I got,
C:\Users\(My Profile)\Downloads\ethminer-0.19.0-alpha.0-cuda9.1-windows-amd64.zip
the file is c…
-
I have configured post_kill_exe in nohang.conf to execute certain actions after killing a process. However, I've noticed that post_kill_exe is not triggered consistently for every kill event.
It see…
-
An important component of NoScript, preventing "untrusted" sites from abusing "trusted" ones to execute scripts through reflective XSS, is its anti-XSS filter called "InjectionChecker".
This Injec…