-
> Implementations may execute cryptographic operations in the client, potentially exposing a user’s private key to JavaScript, which makes keys vulnerable to exfiltration.
If “in the client” here m…
-
Hello
DGA detection / DNS data exfiltration is difficult to detect.
An indicator of malicious activity is to check the host cache hit rate. If a host is asking a lot of names which are not in the c…
-
(Originally raised on slack)
Currently node/subflow icons have to either be a FA classname, or the name of an icon file provided by the nodes.
It would useful to be able to provide the icon as a…
-
### Problem Description
The wanderer campaign drops a lore bombshell: korath exiles know how to make jump drives.
> https://github.com/endless-sky/endless-sky/blob/c7a3541850828e2d4015dc31e7bad983…
-
Happy to see python in Excel :-)
I get a ProxyError when trying to make https requests using the requests library. Is this by design?
`import requests`
`URL = "https://www.geeksforgeeks.org/dat…
-
https://github.com/step-security/harden-runner
-
https://www.databreaches.net/four-more-attacks-on-the-healthcare-sector-weekend-edition/
"Regal Medical Group, Lakeside Medical Organization, ADOC Medical Group, and Greater Covina Medical (collect…
-
As an infrastructure admin, I want to be able to examine container running processes within my Kubernetes infrastructure so that I can easily alert on potential data exfiltration events (ie: need to b…
-
I think we can improve that part using compression and/or base32 encoding.
DoZ10 updated
4 years ago
-
I don't actually know what to do about this:
> The mitigations to the content exfiltration case regard participants
> in the protocol as potential passive attackers themselves, and apply
> the …