-
My IT security team rejected Tabular Editor with the following concern.
> Here is additional information regarding the rejection of your Software Request RITM0140368: \"2 matches for rule Suspicio…
-
Hi there sir,
Hope you are at your best, I am a studying graduation (Masters) of information security at a well know university in Pakistan and working on SDNs and their integration with Honeypots. S…
-
## Affected Version
4.x
## Description
When deploying a site in live mode, and enabling SSL behind a waf or proxy (such as cloudflare), in conjunction with force SSL, you can easily end up in…
-
A while back, I played around with adding a moneroseed URI scheme, which would allow telling the OS to call monerod when clicking on such a URI. The format was moneroseed://IP[:PORT], and it's piggyba…
-
To fix the production Demo I will want to add some features that allow me to better moderate and block bad actors trying to abuse the demo service.
The biggest thing would be adding checks on the des…
-
### Context
A software vendor may deploy mechanisms to gather and analyze various signals associated with subjects such as users, devices, etc. These signals, which can originate from diverse channe…
-
First of all, Lulu is a great product and thanks for all your hard work.
I'm finding it struggling to find a baseline list of "blocklist" and rules (ips, ports, destinations etc).
Would be great i…
-
My investigation starts off when I clicked on a fake pantip post supposedly mimicking an intent to book bzx4 car. The behavior after initial compromise is alike to #54 but now the perpetrators limits …
-
Nando brought this to my attention. The minimum codedeploy policy that was added to the Jenkins IAM Role Policy allows the possibility of malicious code to be pushed out from the jenkins server. This …
-
Nando brought this to my attention. The minimum codedeploy policy that was added to the Jenkins IAM Role Policy allows the possibility of malicious code to be pushed out from the jenkins server. This …