-
According to @panositi, the EU project TELEMETRY has a use case that requires some elaboration in the models of software processes and control of router functions. The requirements are:
1. A mechanis…
-
**Describe the bug:**
The threat intel tab is displayed when there isn't any threat intel see screenshot
**Kibana/Elasticsearch Stack version:**
v 7.16.1 from Edne
**Original install method (e…
-
# User stories
## User can run `fabric` withing Github issues
As a GitHub user, I want to be able to use a GitHub action to leverage a large language model (LLM) from the [fabric](https://github…
-
http://www.bbc.com/news/uk-northern-ireland-36386890
-
**Describe what problem your feature request solves**:
The Threat Dragon file format / JSON schema uses two related but incompatible versions for 1.x and 2.x, and neither of these is a format other t…
-
# Task Description: Cyber Security Dashboard
## Background
As a company dealing with sensitive data, it is crucial to keep track of our cyber security stats to ensure the safety and integrity of…
-
A few users reported mapping errors on a few integrations. We suspect these problems may be related to integrations that migrated to ecs@mappings with recent updates.
Here is the list of fields with …
zmoog updated
2 weeks ago
-
I would like to have the ability to create rules on registry hives, for example:
```yml
---
title: T1547.004 - Winlogon System Shell Changed
group: Persistence
description: Winlogon\Shell changed…
-
### 1. Current Behavior
#### 1.1. Description
When using Rune Strike in blood presence it only generates ``damage * 5`` threat
#### 1.2. How to Reproduce
1. Get enough Runic Power t…
-
@kalanakotawalagedara Add household chemicals as a node. Follow below articles. You might need to categorize them as well. If you can find a separate chemical data base for these mentioned in here.
h…