-
Structured Threat Information Expression (STIX) is a language for expressing cyber threat and observable information. While we have several Threat Intel integrations which map STIX formatted data to E…
-
**Describe what problem your feature request solves**:
PLOT4ai contains a database of 86 threats. Threat Dragon recently added support for the categories, similar to the other frameworks, but it woul…
-
**Describe what problem your feature request solves**:
LINDDUN contains a database of 35 threats. Threat Dragon already has support for the categories, similar to the other frameworks, but it would b…
-
## What is missing or needs to be updated?
There is no section dedicated to support for development teams.
I will propose the first entry to begin the description of good practices.
I pro…
sebob updated
4 weeks ago
-
I ran a brew update to the latest version of ngrok 3.7.0 and Avast put it into quarantine.
Malware detected: MacOS:Ngrok-A [Tool]
Unsure if this is a false flag?
MacOS: Sonoma 14.4
M1 Mac
-
Windows Defender is reporting the following on scrutiny on my system. it started happening today.
![image](https://github.com/AnalogJ/scrutiny/assets/4553932/b4cea63c-483d-41bf-ba93-bf0c60960aca)
…
-
## Parent Epic (If Applicable)
* https://github.com/elastic/ia-trade-team/issues/271
## Meta Summary
Auth0 is a third-party authentication and authorization platform that allows developers to…
-
### Area for Improvement
A security review with threat model is needed for the Radius project
### Observed behavior
_No response_
### Desired behavior
n/a
### Proposed Fix
_No response_
### ra…
-
Bonjour,
Je viens d'installer selks comme système IPS/IDS dans un réseau d'une société j'ai quelques questions à ce sujet :
Peut-on l'utiliser comme Système IPS/IDS ?
Comment activer Threat R…
-
### Current Behaviour
Threat system - or implementation of all raid bosses - has a major issue.
abilities that should cause a npc to attack a different target, although lower on threat table (e.g. b…