-
## The context
We need to be on the same page to discuss the problem and solution of Incident Response (IR) and Threat Detection (TD) connection. Here is some information that will provide you with…
-
### Support Questions
Hello,
I know that my request will probably remain unanswered but i think it could help to have a broad view on what misp can do. I've seen in [misp gitter chat](https://ap…
-
# Background
UCO currently lacks the ability for the expression of a structured interrogatory mechanism (e.g., query, pattern, etc.) to reduce a set of data to a particular desired scope.
This abi…
-
-
# Trending repositories for C#
1. [**dotnet / maui**](https://github.com/dotnet/maui)
__.NET MAUI is the .NET Multi-platform App UI, a framework for building native device applica…
-
Immunity debugger is completely obsoleted. x64dbg+scylla/titanhide is what should be taught in courses desiring a GUI debugger w/ anti-anti-debug.
win7 is also end of life and declining in market …
-
# Background
UCO currently has very limited expressive capabilities for characterizing information around software.
There is a need for some basic capabilities around software contextualization.
…
-
_brainstorm_ Not afraid of assembly! Defend: July 2025. Phd ambition?!
First, describe the scope and past occurrences of node hijacks.
From Solarwinds to the [recent 1.3 million Android TVs in a b…
-
Post questions here for this week's oritenting readings: Collins, Randall. 2009. “The Micro-sociology of Violent Confrontations” and “Confrontational Tension and Incompetent Violence” (beginning of Ch…
-
Have concern about how to best utilize Intrusions sets. Having Russian Cyber Threat LandScape as example, how can we categorize (GRU, SVR, FSB) in one hand and (APT28, APT829, Sandworm) on another han…