-
Our production deployment tends to get choked up when there are storms of incidents being posted to it. I.e. the k8s load balancer returns a "502 Bad Gateway" when the backend no longer is processing …
-
Under Section 2, Cyber Incident Reporting, the definition of cyber incident is: "actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effe…
-
# Scope
Need to add static tracepoints to key parts of Tempesta FW, they are very helpful for performance analyzing. Now I can suggest following places: TLS handshake begin/end, request/response fo…
-
### System Info
OS version: WIN11
Python version: 3.12
The current version of pandasai being used: 2.3.0
### 🐛 Describe the bug
I'm requesting LLM to generate plotly plot that able to randomly pi…
-
Hey SNORT team, my team has developed SNORT GUI, documentation [here](https://github.com/WhiteHatCyberus/SNORT-GUI).
I hope we can collaborate and consider this as an immense resource.
We have focus…
-
Create incident scoring and prioritization schema based on known or potential impact to your organization. Utilize score to define frequency of status updates and escalation procedures.
*Measures*
…
-
### Description of the enhancement request
Introduce a feature that allows users to change their own passwords, with the option to enable or disable this functionality through settings. This will…
-
Required by @stephen-soltesz to make mlab-ns operation better.
This is part of handling [the six hours clients incident](https://github.com/neubot/killer-queen).
(While discussing with Stephen w…
-
## What is the proposed Cheat Sheet about?
The proposed cheat sheet, titled "Incident Response for Web Applications," aims to provide a practical guide for handling security incidents related to …
-
## Describe the current behavior in detail
Checked on https://wormhole-connect-mainnet.netlify.app/.
Steps:
1. Prepare to send 3 POL from Polygon (MetaMask) to Solana (Phantom)
2. Select Automa…