-
Hi, i use Maldet to monitor paths which seem to be working fine, about 50% of the time the hit list in the monitor summary email is missing the name of the detection name and the path.
Here a examp…
-
## What is the proposed Cheat Sheet about?
The proposed cheat sheet, titled "Incident Response for Web Applications," aims to provide a practical guide for handling security incidents related to …
-
## I'm submitting a Trojan --Coin Miner -- Severe Threat
```html
[ ] Regression (a behavior that used to work and stopped working in a new release)
[ ] Bug report
[ ] Feature request
…
-
### Is your feature request related to a problem?
Yes, the current limitation I'm facing involves the "Security Analytics" functionality within OpenSearch. My main issue is the inability to visualize…
ghost updated
1 month ago
-
# Description
The attacker enumerates the environment’s domain controller (T1018)
-
* Operating System Version:
* Deploying via (VirtualBox/VMWare/AWS/Azure/ESXi): AWS
* Vagrant Version (if applicable):
Please verify that you are building from an updated Master branch before f…
-
![image](https://user-images.githubusercontent.com/60084078/209737152-fe6999b0-7d50-4d47-aa51-b965b7e2da9a.png)
-
### Description
Endace is a leading provider of high-speed network packet recording, playback, and analytics solutions. Specializing in network visibility and security, Endace empowers organizations …
-
I couldn't find anything regarding a field for "Application" (as in executed program on an OS, not L7 application ID of a network flow)
Application.name
Application.verison
etc...
Am I missing…
-
There are two related things that lack for us in the events and that would allow us to migrate more easily.
- User-Agent
- Custom user parameters (we use it like `/oauth2/authorize?myParam=value`
…